首页> 外文期刊>Computer Communications >A scalable network forensics mechanism for stealthy self-propagating attacks
【24h】

A scalable network forensics mechanism for stealthy self-propagating attacks

机译:用于隐身自我传播攻击的可扩展网络取证机制

获取原文
获取原文并翻译 | 示例

摘要

Network forensics supports capabilities such as attacker identification and attack reconstruction, which complement the traditional intrusion detection and perimeter defense techniques in building a robust security mechanism. Attacker identification pinpoints attack origin to deter future attackers, while attack reconstruction reveals attack causality and network vulnerabilities. In this paper, we discuss the problem and feasibility of back tracking the origin of a self-propagating stealth attack when given a network traffic trace for a sufficiently long period of time. We propose a network forensics mechanism that is scalable in computation time and space while maintaining high accuracy in the identification of the attack origin. We further develop a data reduction method to filter out attack-irrelevant data and only retain evidence relevant to potential attacks for a post-mortem investigation. Using real-world trace driven experiments, we evaluate the performance of the proposed mechanism and show that we can trim down up to 97% of attack-irrelevant network traffic and successfully identify attack origin.
机译:网络取证支持攻击者识别和攻击重建等功能,这些功能可补充传统的入侵检测和外围防御技术,以构建强大的安全机制。攻击者识别可以确定攻击源,以阻止未来的攻击者,而攻击重建则可以揭示攻击的因果关系和网络漏洞。在本文中,我们讨论了在足够长的时间内获得网络流量跟踪时回溯自传播隐形攻击的起源的问题和可行性。我们提出了一种网络取证机制,该机制可在计算时间和空间上扩展,同时在识别攻击源时保持高精度。我们进一步开发了一种数据缩减方法,以过滤掉与攻击无关的数据,并且仅保留与潜在攻击相关的证据以进行事后调查。使用真实世界的跟踪驱动实验,我们评估了所提出机制的性能,并表明我们可以减少多达97%的与攻击无关的网络流量,并成功识别出攻击源。

著录项

  • 来源
    《Computer Communications》 |2013年第13期|1471-1484|共14页
  • 作者单位

    Department of Electrical Engineering, National Taiwan University, No. 1, Sec. 4, Roosevelt Rd., Taipei 106, Taiwan;

    Institute of Information Science, Academia Sinica, No. 128, Sec. 2, Academia Rd., Nankang Taipei 115, Taiwan;

    Department of Electrical Engineering, National Taiwan University, No. 1, Sec. 4, Roosevelt Rd., Taipei 106, Taiwan;

    Department of Information Management, National Taiwan University, No. 1, Sec. 4, Roosevelt Rd., Taipei 106, Taiwan;

  • 收录信息 美国《科学引文索引》(SCI);美国《工程索引》(EI);
  • 原文格式 PDF
  • 正文语种 eng
  • 中图分类
  • 关键词

    Network forensics; Data reduction; Stealthy self-propagating attack; Contact activity;

    机译:网络取证;数据减少;隐身的自我传播攻击;联系活动;

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号