首页> 外文学位 >Detection of network infrastructure attacks using artificial traffic.
【24h】

Detection of network infrastructure attacks using artificial traffic.

机译:使用人工流量检测网络基础设施攻击。

获取原文
获取原文并翻译 | 示例

摘要

As organisations rely increasingly more on resources only available through interconnected networks, routers and other network-layer components are likely to become the focus of increased attention by malicious users or intruders. Several means are available to influence the routing function of network components, allowing an intruder to disrupt the flow of information or to gather information that would have otherwise been protected.;The system proposed in this thesis aims at detecting traffic diversion attacks by monitoring variations in the round-trip delay of packets injected at various locations in the network. To assess the feasibility of the proposed concept, specific hosts were configured to run a prototype program that regularly probes other hosts using special User Datagram Protocol (UDP) packets and records precise measurements of the round-trip time. Based on the behaviour of the delay, the program will raise an alarm to indicate a possible problem with the routing function of the network. The program also has the capability of recording the route taken by packets through the use of the Internet Protocol (IP) Record Route header option.;The limitations and accuracy of the prototype system were identified in a controlled environment. Trials were then made on a medium-size production network, and the measured return-trip time (RTT) was analysed. While most trials resulted in the expected RTT behaviour, some revealed the presence of network pathologies. Routing irregularities were also identified through the use of Record Route packets.;The detection system monitors the statistical behaviour of the measured delay and can adapt to changing network load conditions, but not to a sudden increase that would be the result of a traffic diversion attack. The system is able to detect the network problems identified in the trials, as well as a simulated traffic diversion attack. (Abstract shortened by UMI.).
机译:随着组织越来越依赖只能通过互连网络获得的资源,路由器和其他网络层组件可能会成为恶意用户或入侵者日益关注的焦点。有几种方法可以影响网络组件的路由功能,从而使入侵者破坏信息流或收集原本应该受到保护的信息。本文提出的系统旨在通过监视网络中的变化来检测流量转移攻击。在网络中各个位置注入的数据包的往返延迟。为了评估提出的概念的可行性,将特定主机配置为运行原型程序,该程序使用特殊的用户数据报协议(UDP)数据包定期探测其他主机,并记录往返时间的精确测量值。根据延迟的行为,程序将发出警报以指示网络的路由功能可能存在的问题。该程序还具有通过使用Internet协议(IP)记录路由头选项来记录数据包所采用的路由的功能。在受控环境中确定了原型系统的局限性和准确性。然后在中等规模的生产网络上进行试验,并分析测得的回程时间(RTT)。尽管大多数试验都能达到预期的RTT行为,但有些试验表明存在网络病理。还通过使用“记录路由”数据包来识别路由异常。检测系统监视所测量的延迟的统计行为,并且可以适应不断变化的网络负载状况,但不会因流量转移攻击而突然增加。该系统能够检测到试验中发现的网络问题以及模拟的流量转移攻击。 (摘要由UMI缩短。)。

著录项

  • 作者单位

    Royal Military College of Canada (Canada).;

  • 授予单位 Royal Military College of Canada (Canada).;
  • 学科 Engineering Electronics and Electrical.
  • 学位 M.Eng.
  • 年度 1998
  • 页码 145 p.
  • 总页数 145
  • 原文格式 PDF
  • 正文语种 eng
  • 中图分类
  • 关键词

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号