首页> 外文会议>International Conference on Algorithmic Applications in Management(AAIM 2005); 20050622-25; Xian(CN) >Constructing Correlations in Attack Connection Chains Using Active Perturbation
【24h】

Constructing Correlations in Attack Connection Chains Using Active Perturbation

机译:使用主动扰动在攻击连接链中构建关联

获取原文
获取原文并翻译 | 示例

摘要

Usually network attackers conceal their real attacking paths by establishing interactive connections along a series of intermediate hosts (stepping stones) before they attack the final target. We propose two methods for detecting stepping stones by actively perturbing inter-packet delay of connections. Within the attacker's perturbation range, the average value of the packets in the detecting window is set to increase periodically. The methods can construct correlations in attacking connection chains by analyzing the change of the average value of the inter-packet delay between the two connection chains. The methods can reduce the complexity of correlation computations and improve the efficiency of detecting stepping stones.
机译:通常,网络攻击者会在攻击最终目标之前,通过沿着一系列中间主机(踏脚石)建立交互式连接来隐藏其真实的攻击路径。我们提出了两种方法,可以通过主动干扰分组间的连接延迟来检测踏脚石。在攻击者的摄动范围内,将检测窗口中数据包的平均值设置为定期增加。该方法可以通过分析两个连接链之间的分组间延迟的平均值的变化来构造攻击连接链的相关性。该方法可以减少相关计算的复杂度,并提高检测踏脚石的效率。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号