【24h】

Lightweight Scheme for Generating Stealthy Probes

机译:用于产生隐身探针的轻量级方案

获取原文

摘要

Probing based approaches have been effectively used for network monitoring in the past. Probes such as ICMP pings provide an effective tool for detecting compromised nodes which try to delay or drop traffic But an intelligent attacker may evade detection by giving preferential treatment to probe traffic. This is usually possible because probe packets have a different format from regular application packets and are easily distinguishable. The solution to this problem is to create stealthy probes which are indistinguishable from normal application traffic. In this paper, we build upon our earlier work on the design approaches for stealthy probing, and we propose a lightweight and effective scheme for generating stealthy probes.
机译:基于探测的方法已经有效地用于过去的网络监测。诸如ICMP Ping的探测提供了一种有效的工具,用于检测尝试延迟或丢弃流量但智能攻击者可以通过对探测流量进行优先处理来逃避检测的受损节点。这通常是可能的,因为探测分组具有来自常规应用程序分组的不同格式,并且易于区分。解决此问题的解决方案是创建隐秘的探针,该探针与正常应用流量无法区分。在这篇论文中,我们建立了我们早期的秘密探讨的设计方法,并提出了一种用于产生隐身探针的轻量级和有效的方案。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号