...
首页> 外文期刊>Computers, IEEE Transactions on >Localization Attacks to Internet Threat Monitors: Modeling and Countermeasures
【24h】

Localization Attacks to Internet Threat Monitors: Modeling and Countermeasures

机译:Internet威胁监视器的本地化攻击:建模和对策

获取原文
获取原文并翻译 | 示例

摘要

Internet Threat Monitoring (ITM) systems are a widely deployed facility to detect, analyze, and characterize dangerous Internet threats such as worms and distributed denial-of-service (DDoS) attacks. Nonetheless, an ITM system can also become the target of attacks. In this paper, we address localization attacks against ITM systems in which an attacker impairs the effectiveness of an ITM system by identifying the locations of ITM monitors. We propose an information-theoretic framework that models localization attacks as communication channels. Based on this model, we generalize all existing attacks as "temporal attacks,ȁD; derive closed formulas of their performance, and propose an effective attack detection approach. The information-theoretic model also inspires a new attack called a spatial attack and motivates the corresponding detection approach. We show simulation results that support our theoretic findings.
机译:Internet威胁监视(ITM)系统是一种广泛部署的工具,用于检测,分析和表征蠕虫和分布式拒绝服务(DDoS)攻击等危险的Internet威胁。尽管如此,ITM系统也可能成为攻击的目标。在本文中,我们解决了针对ITM系统的本地化攻击,其中攻击者通过识别ITM监视器的位置来削弱ITM系统的有效性。我们提出了一个信息理论框架,该模型将本地化攻击建模为通信渠道。在此模型的基础上,我们将所有现有的攻击归纳为“时间攻击,ȁD;得出其性能的封闭公式,并提出有效的攻击检测方法。”信息理论模型还激发了一种新的攻击,称为空间攻击并激发了相应的攻击。检测方法我们展示了支持我们理论发现的仿真结果。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号