资源描述:
《active traffic analysis attacks and countermeasures》由会员上传分享,免费在线阅读,更多相关内容在教育资源-天天文库。
1、ActiveTrafficAnalysisAttacksandCountermeasuresXinwenFu,BryanGraham,RiccardoBettatiandWeiZhaoDepartmentofComputerScienceTexasA&MUniversityCollegeStation,TX77843-3112E-mail: xinwenfu,bwg7173,bettati,zhao@cs.tamu.eduAbstractmissioncriticalinformationofsystemsbyobservingthestatisticsoftraffic.S
2、uchcriticalinformationcanincludetheToexploremission-criticalinformation,anadversaryidentityofsendersorreceivers,theestablishmentandtear-usingactivetrafficanalysisattacksinjectsprobingtrafficdownofflows,bandwidthconsumption,burstiness,etc.Aintothevictimnetworkandanalyzesthestatusofunderly-numb
3、erofsuchattacksrecently([9,14,24,27,28])haveingpayloadtraffic.Activetrafficanalysisattacksareeasyillustratedtheseriousnessofthedamageincurred.Byus-todeployandhencebecomeaseriousthreattomissioncrit-ingatiminganalysisonSSHtraffic[27],passwordsfortheicalapplications.Thispapersuggestsstatisticalp
4、atterncommunicationpartiescanbeidentified.recognitionasafundamentaltechnologytoevaluateeffec-Intermsofattacktechniques,trafficanalysisattackscantivenessofactivetrafficanalysisattacksandcorrespondingbefurtherdividedintotwosubclasses,namelypassiveandcountermeasures.Ourevaluationshowsthatsamplee
5、n-activetrafficanalysisattacks.Inapassivetrafficanalysistropyofpingpackets’roundtriptimeisaneffectivefeatureattack,theadversarypassivelycollectstrafficdata(e.g.,statistictodiscoverthepayloadtrafficrate.Weproposetrafficdumpedusingtcpdump)andmakesanalysisoversimplecountermeasuresthatcansignificant
6、lyreducetheef-them.Passivetrafficanalysisattacksmay,atfirstsight,fectivenessofping-basedactivetrafficanalysisattacks.Ourappearinnocuoussincethoseattacksdonotactivelyalterexperimentsvalidatetheeffectivenessofthisscheme,whichthetraffic(e.g.,drop,insert,andmodifypacketsduringacanalsobeusedinother
7、scenarios.communicationsession).Thus,thistypeofattackisof-tendifficulttodetect.But,apassivetrafficanalysisattackissometimesdifficulttodeploy.Forexample,acommon1Introductionwayofrealizingapassiveattackisbywiretapping.Thisisnoteasysinceitisgenerallymorestraightforw