首页> 外文会议>International Workshop on Information Hiding(IH 2004) >Empirical and Theoretical Evaluation of Active Probing Attacks and Their Countermeasures
【24h】

Empirical and Theoretical Evaluation of Active Probing Attacks and Their Countermeasures

机译:积极探测攻击的实证与理论评价及对策

获取原文

摘要

A variety of remote sensing attacks allow adversaries to break flow confidentiality and gather mission-critical information in distributed systems. Such attacks are easily supplemented by active probing attacks, where additional workload (e.g., ping packets) is injected into the victim system. This paper presents statistical pattern recognition as a fundamental technology to evaluate the effectiveness of active probing attacks. Our theoretical analysis and empirical results show that even if sophisticated approaches of link padding are used, sample entropy of probing packets' round trip time is an effective and robust feature statistic to discover the user payload traffic rate, which is important for maintaining anonymous communication. Extensive experiments on local network, campus network, and the Internet were carried out to validate the system security predicted by the theoretical analysis. We give some guidelines to reduce the effectiveness of such active probing attacks.
机译:各种遥感攻击允许对手进行流动机密性,并在分布式系统中收集任务关键信息。 通过主动探测攻击易于补充这种攻击,其中将额外的工作负载(例如,ping报文)注入受害者系统中。 本文提出了统计模式识别,作为评估积极探测攻击的有效性的基本技术。 我们的理论分析和经验结果表明,即使使用链路填充的复杂方法,探测分组的往返时间的样本熵也是一个有效且坚固的特征统计,以发现用户有效载荷流量速率,这对于维护匿名通信很重要。 对当地网络,校园网络和互联网进行了广泛的实验,以验证理论分析预测的系统安全性。 我们提供了一些指导方针,以降低此类积极探测攻击的有效性。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号