...
首页> 外文期刊>Computer networks >Interval-based flow watermarking for tracing interactive traffic
【24h】

Interval-based flow watermarking for tracing interactive traffic

机译:基于间隔的流水印,用于跟踪交互式流量

获取原文
获取原文并翻译 | 示例

摘要

Tracing interactive attack traffic that traverses stepping stones (i.e., intermediate hosts) is challenging, as the packet headers, lengths, and contents can all be changed by the stepping stones. The traffic timing (delays between packets) has therefore been studied as a means of tracing traffic. One such technique uses traffic timing as a side channel into which a watermark, or identifying tag, can be embedded to aid with tracing. The effectiveness of such techniques is greatly reduced when the packet count of the traffic is changed at the stepping stone. Such transformations may occur as a result of either active countermea-sures (e.g. chaff packets, flow splitting) by an adversary attempting to defeat tracing, or by incidental repacketization of the traffic by network interfaces. This paper presents a new method of embedding a watermark in traffic timing, for purposes of tracing the traffic in the presence of flow splitting, chaff packets, timing perturbation, and repacketization. This method uses an invariant characteristic of two connection flows which are part of the same stepping stone chain, namely, the elapsed time of the flows. The duration of each flow is sliced into short fixed-length intervals. Packet timing is adjusted to manipulate the packet count in specific intervals (without adding or deleting any packets), for purposes of embedding the watermark. The method is self-synchronizing and does not require clock synchronization between the watermark encoder and decoder. A statistical analysis of the method, with no assumptions or limitations concerning the distribution of packet times, proves the effectiveness of the method given a sufficient number of packets, despite natural and/or deliberate repacketization and countermeasures by an adversary. The method has been implemented and tested on a large number of SSH traffic flows. The results demonstrate that 100% detection rates and very low false positive rates are achieved under conditions of multiple countermeasures, and using only a few hundred packets.
机译:跟踪穿越垫脚石(即中间主机)的交互式攻击流量非常具有挑战性,因为包头,长度和内容都可以通过垫脚石来更改。因此,已经研究了通信时间(分组之间的延迟)作为跟踪通信的手段。一种这样的技术使用交通定时作为辅助信道,可以在其中嵌入水印或识别标签以辅助跟踪。当业务的数据包计数在垫脚石上更改时,此类技术的有效性会大大降低。此类攻击可能是由于攻击者试图打败跟踪而采取的主动对策(例如谷壳数据包,流量拆分)的结果,也可能是由于网络接口对流量进行了偶然的重新打包而导致的。本文提出了一种在流量定时中嵌入水印的新方法,目的是在存在流拆分,谷壳数据包,定时扰动和重新打包的情况下跟踪流量。该方法利用了两个连接流的不变特性,它们是同一踏脚石链的一部分,即流的经过时间。每个流的持续时间被切成短的固定长度间隔。为了嵌入水印,调整包定时以在特定间隔内操作包计数(不添加或删除任何包)。该方法是自同步的,不需要水印编码器和解码器之间的时钟同步。对该方法进行统计分析,没有假设或限制数据包时间的分布,证明了该方法在足够数量的数据包的情况下的有效性,尽管对手进行了自然和/或故意的重新打包和对策。该方法已在大量SSH流量中实现和测试。结果表明,在多种对策条件下,仅使用几百个数据包,就能实现100%的检测率和极低的误报率。

著录项

  • 来源
    《Computer networks》 |2012年第5期|p.1646-1665|共20页
  • 作者单位

    Cyber Defense Laboratory, Computer Science Department, North Carolina State University, Raleigh, NC 27695-8207, United States;

    Cyber Defense Laboratory, Computer Science Department, North Carolina State University, Raleigh, NC 27695-8207, United States;

    Cyber Defense Laboratory, Computer Science Department, North Carolina State University, Raleigh, NC 27695-8207, United States;

    Computer Science Department, George Mason University, Fairfax, Virginia 22030, United States;

    Cyber Defense Laboratory, Computer Science Department, North Carolina State University, Raleigh, NC 27695-8207, United States;

  • 收录信息
  • 原文格式 PDF
  • 正文语种 eng
  • 中图分类
  • 关键词

    intrusion tracing; stepping stones; flow watermarking; flow correlation;

    机译:入侵追踪;垫脚石;流水印;流量相关;

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号