首页> 外文学位 >Attack attribution for distributed denial-of-service and worm attacks.
【24h】

Attack attribution for distributed denial-of-service and worm attacks.

机译:分布式拒绝服务和蠕虫攻击的攻击归因。

获取原文
获取原文并翻译 | 示例

摘要

Attack attribution has been a very challenging problem for years. Perpetrators have become skillful in masquerading their identity and launching various attacks on the Internet, some of which could be damaging and disruptive, such as Distributed denial-of-service (DDoS) attacks and Worm attacks. With the steady increase in the number of software vulnerabilities and the availability of sophisticated attack tools, it has become easy for "hackers" to gain/control access to many end-hosts all around the world, from which they wage all sort of attacks without getting caught. Moreover, the Internet routing infrastructure is stateless and based largely on destination addresses; there exists no official entity that police the Internet to ensure that the source IP address is correct. The potentiality of spoofing IP addresses has made communication running over stateless protocols (e.g., User Datagram Protocol (UDP), Internet Control Message Protocol (ICMP)) and many types of DDoS attacks untraceable.; The purpose of this thesis is to explore the problem of attack attribution and to propose some plausible solutions that would render the Internet infrastructure more secure. We propose attack attribution solutions for both Distributed Denial-of-Service (DDoS) attacks and Worm attacks. In the case of DDoS attacks, we propose a new deterministic packet marking scheme to trace back in realtime to the thousands of sources of DDoS attacks assuming that the attacking end-hosts use IP address spoofing. For Worm attacks, we propose the reconstruct the infection tree for TCP and UDP scanning worms from data gathered at network telescopes. Such information would also help in replaying the global spread of a worm and gather many forensics about the infected machines and the network they are attached to.
机译:多年来,攻击归因一直是一个非常具有挑战性的问题。犯罪者已经熟练掌握了伪装自己的身份并在Internet上发起各种攻击的能力,其中一些攻击可能会造成破坏性和破坏性,例如分布式拒绝服务(DDoS)攻击和蠕虫攻击。随着软件漏洞数量的不断增加以及复杂攻击工具的可用性,“黑客”变得很容易获得/控制全球各地许多最终主机的访问权限,他们可以从中发起各种攻击而无需被抓到。此外,Internet路由基础结构是无状态的,并且主要基于目标地址。没有官方机构可以监管互联网以确保源IP地址正确。欺骗IP地址的可能性使通信运行在无状态协议(例如,用户数据报协议(UDP),Internet控制消息协议(ICMP))上,并且许多类型的DDoS攻击都是不可追踪的。本文的目的是探讨攻击归因问题,并提出一些可行的解决方案,以使Internet基础结构更加安全。我们提出了针对分布式拒绝服务(DDoS)攻击和蠕虫攻击的攻击归因解决方案。在DDoS攻击的情况下,我们提出一种新的确定性数据包标记方案,以实时追溯到数千个DDoS攻击源,并假设攻击的最终主机使用IP地址欺骗。对于蠕虫攻击,我们建议从网络望远镜收集的数据中重建TCP和UDP扫描蠕虫的感染树。这些信息还将有助于重放蠕虫的全球传播,并收集有关受感染机器及其所连接网络的许多取证信息。

著录项

  • 作者

    Hamadeh, Ihab.;

  • 作者单位

    The Pennsylvania State University.;

  • 授予单位 The Pennsylvania State University.;
  • 学科 Computer Science.
  • 学位 Ph.D.
  • 年度 2006
  • 页码 182 p.
  • 总页数 182
  • 原文格式 PDF
  • 正文语种 eng
  • 中图分类 自动化技术、计算机技术;
  • 关键词

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号