...
【24h】

Detecting Malicious Packet Losses

机译:检测恶意数据包丢失

获取原文
获取原文并翻译 | 示例

摘要

In this paper, we consider the problem of detecting whether a compromised router is maliciously manipulating its stream of packets. In particular, we are concerned with a simple yet effective attack in which a router selectively drops packets destined for some victim. Unfortunately, it is quite challenging to attribute a missing packet to a malicious action because normal network congestion can produce the same effect. Modern networks routinely drop packets when the load temporarily exceeds their buffering capacities. Previous detection protocols have tried to address this problem with a user-defined threshold: too many dropped packets imply malicious intent. However, this heuristic is fundamentally unsound; setting this threshold is, at best, an art and will certainly create unnecessary false positives or mask highly focused attacks. We have designed, developed, and implemented a compromised router detection protocol that dynamically infers, based on measured traffic rates and buffer sizes, the number of congestive packet losses that will occur. Once the ambiguity from congestion is removed, subsequent packet losses can be attributed to malicious actions. We have tested our protocol in Emulab and have studied its effectiveness in differentiating attacks from legitimate network behavior.
机译:在本文中,我们考虑了检测受感染路由器是否正在恶意操纵其数据包流的问题。尤其是,我们关注一种简单而有效的攻击,其中路由器有选择地丢弃发往某些受害者的数据包。不幸的是,将丢失的数据包归因于恶意行为是非常具有挑战性的,因为正常的网络拥塞可能产生相同的效果。当负载暂时超过其缓冲容量时,现代网络通常会丢弃数据包。先前的检测协议已尝试使用用户定义的阈值解决此问题:丢弃的数据包过多意味着恶意。但是,这种启发式方法从根本上讲是不正确的。设置此阈值充其量是一门艺术,并且肯定会产生不必要的误报或掩盖高度集中的攻击。我们已经设计,开发和实施了一种受损的路由器检测协议,该协议会根据测得的流量速率和缓冲区大小动态推断将要发生的拥塞数据包丢失的数量。一旦消除了拥塞带来的歧义,随后的数据包丢失就可以归因于恶意行为。我们已经在Emulab中测试了我们的协议,并研究了其在区分攻击与合法网络行为方面的有效性。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号