首页> 外文会议>ACM conference on computer and communications security >Robust Correlation of Encrypted Attack Traffic Through Stepping Stones by Manipulation of Interpacket Delays
【24h】

Robust Correlation of Encrypted Attack Traffic Through Stepping Stones by Manipulation of Interpacket Delays

机译:通过操作内部延迟操纵加密攻击流量的加密攻击流量的鲁棒相关性

获取原文

摘要

Network based intruders seldom attack directly from their own hosts, but rather stage their attacks through intermediate "stepping stones" to conceal their identity and origin. To identify attackers behind stepping stones, it is necessary to be able to correlate connections through stepping stones, even if those connections are encrypted or perturbed by the intruder to prevent traceability. The timing-based approach is the most capable and promising current method for correlating encrypted connections. However, previous timing-based approaches are vulnerable to packet timing perturbations introduced by the attacker at stepping stones. In this paper, we propose a novel watermark-based correlation scheme that is designed specifically to be robust against timing perturbations. The watermark is introduced by slightly adjusting the timing of selected packets of the flow. By utilizing redundancy techniques, we have developed a robust watermark correlation framework that reveals a rather surprising result on the inherent limits of independent and identically distributed (iid) random timing perturbations over sufficiently long flows. We also identify the tradeoffs between timing perturbation characteristics and achievable correlation effectiveness. Experiments show that the new method performs significantly better than existing, passive, timing-based correlation in the presence of random packet timing perturbations.
机译:基于网络的入侵者很少攻击自己的主机,而是通过中间“踏脚石”攻击来隐瞒他们的身份和起源。为了识别踩踏石头后面的攻击者,即使这些连接被入侵者加密或扰乱以防止可追溯性,也能够能够通过踏脚石来关联连接。基于时序的方法是用于关联加密连接的最有能力和最有希望的电流方法。然而,以前的基于时序的方法容易受到攻击者在踩踏石头引入的分组定时扰动。在本文中,我们提出了一种基于水印的基于水印的相关方案,该相关方案专门设计为鲁棒性扰动。通过略微调整流量的所选数据包的定时来引入水印。通过利用冗余技术,我们开发了一种强大的水印相关框架,其揭示了对独立且相同分布的(IID)随机定时扰动的固有限制的结果相当令人惊讶的结果。我们还确定了时序扰动特征与可实现的相关效果之间的权衡。实验表明,新方法在随机分组定时扰动的存在下显着地优于存在的基于,被动,基于时序的相关性。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号