首页> 外文学位 >Stepping-stone NEtwork Attack Kit (SNEAK) for evading timing-based detection methods under the cloak of constant rate multimedia streams.
【24h】

Stepping-stone NEtwork Attack Kit (SNEAK) for evading timing-based detection methods under the cloak of constant rate multimedia streams.

机译:跳板式NEtwork攻击套件(SNEAK),用于躲避恒定速率多媒体流掩盖下的基于定时的检测方法。

获取原文
获取原文并翻译 | 示例

摘要

With the advent of the Internet, network-based security threats have been constantly on the rise. The source of an attack could be traced by studying the system logs and the source IP address of the attack can be used to identify and prosecute the attacker. To avoid getting traced and to mislead the forensic investigators, attackers usually compromise weaker nodes on less secure networks and use them as stepping stones to attack the victim. This technique makes it difficult for the investigators to trace the real source of attack.Hence, it is important to research the stepping stone detection techniques so that the attackers can be apprehended. An interesting approach towards detecting stepping stones is to correlate incoming and outgoing streams at the stepping stone. A popular way of achieving this is to watermark packet streams as it is effective against a wide range of evasion techniques. Previous investigators have described a promising technique by which an attacker could effectively evade any timing-based detection technique, including watermarking. Their basic idea was to remove timing information from the packet streams by disguising the attack traffic as constant rate multimedia stream.In this thesis, we investigate the effectiveness and plausibility of this approach. We present the design and implementation details of Stepping stone NEtwork Attack Kit (SNEAK), a system that implements the previously described evasion techniques. SNEAK includes implementations of two algorithms for managing traffic at the stepping stone. The first algorithm is the sender-side dropping algorithm, in which the stepping stone makes decisions about dropping packets as needed when packets are sent. The second algorithm is the receiver-side dropping algorithm, in which the stepping stone makes decisions about dropping packets as needed, when packets are received. To counter the packet drop and the packet loss, we maintain redundancy in the packet streams. Both algorithms are suitable for practical use, depending on the needs of the attacker. We defined metrics for robustness, usability and effectiveness, and we studied the trade-offs between them. We implemented a prototype of the SNEAK system and tested it on the PlanetLab network. Our prototype provides reliable transmission and reasonable performance for shell commands over at least two stepping stones and the traffic has the characteristics of a constant rate multimedia stream. We tested the effectiveness of SNEAK against a centroid-interval-based watermarking technique that is currently the best available timing-based detection technique. The experimental results indicate that timing information embedded in the incoming stream is completely eliminated in the outgoing stream. The results also demonstrate that SNEAK is suitable for practical use without affecting the overall usability of the system and SNEAK is effective against all timing based detection techniques. The experimental results demonstrate the need to consider the true potential of the attacker and develop detection methods that use more than low-level timing information to defeat such attacks.
机译:随着Internet的出现,基于网络的安全威胁一直在上升。可以通过研究系统日志来跟踪攻击的来源,并且可以将攻击的源IP地址用于识别和起诉攻击者。为了避免被跟踪并误导法医调查人员,攻击者通常会在安全性较差的网络上破坏较弱的节点,并将其用作攻击受害者的垫脚石。这种技术使调查人员很难找到真正的攻击源。因此,研究踏脚石检测技术以使攻击者能够被逮捕很重要。一种检测踏脚石的有趣方法是关联踏脚石处的入流和出流。实现此目的的一种流行方法是为数据包流添加水印,因为它可以有效地应对各种规避技术。先前的研究人员已经描述了一种有前途的技术,攻击者可以利用该技术有效地逃避任何基于时间的检测技术,包括水印。他们的基本思想是通过将攻击流量伪装成恒定速率的多媒体流来从数据包流中删除定时信息。在本文中,我们研究了这种方法的有效性和合理性。我们介绍了踏脚石NEtwork攻击套件(SNEAK)的设计和实现细节,该系统实现了先前描述的逃避技术。 SNEAK包括用于管理踏脚石交通的两种算法的实现。第一种算法是发送方丢弃算法,其中,踏脚石在发送数据包时根据需要决定是否丢弃数据包。第二种算法是接收器侧丢弃算法,其中,当接收到数据包时,踏脚石会根据需要做出有关丢弃数据包的决定。为了应对丢包和丢包,我们在包流中保持冗余。两种算法都适合实际使用,具体取决于攻击者的需求。我们定义了健壮性,可用性和有效性的指标,并研究了它们之间的权衡。我们实现了SNEAK系统的原型,并在PlanetLab网络上对其进行了测试。我们的原型为至少两个垫脚石上的外壳命令提供了可靠的传输和合理的性能,并且流量具有恒定速率的多媒体流的特性。我们针对基于质心间隔的水印技术测试了SNEAK的有效性,该技术是目前最好的基于时序的检测技术。实验结果表明嵌入在输入流中的定时信息在输出流中被完全消除。结果还表明,SNEAK适用于实际应用而不会影响系统的整体可用性,并且SNEAK对于所有基于定时的检测技术均有效。实验结果表明,有必要考虑攻击者的真正潜能,并开发出使用更多的低级定时信息来抵御此类攻击的检测方法。

著录项

  • 作者

    Padhye, Jaideep.;

  • 作者单位

    The University of Texas at Arlington.;

  • 授予单位 The University of Texas at Arlington.;
  • 学科 Computer Science.
  • 学位 M.S.
  • 年度 2008
  • 页码 57 p.
  • 总页数 57
  • 原文格式 PDF
  • 正文语种 eng
  • 中图分类
  • 关键词

  • 入库时间 2022-08-17 11:38:43

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号