Detecting Malicious Packet Losses

被引:20
|
作者
Mizrak, Alper T. [1 ]
Savage, Stefan [2 ]
Marzullo, Keith [2 ]
机构
[1] VMware, Palo Alto, CA 94304 USA
[2] Univ Calif San Diego, Dept Comp Sci & Engn, La Jolla, CA 92093 USA
关键词
Internet dependability; intrusion detection and tolerance; distributed systems; reliable networks; malicious routers;
D O I
10.1109/TPDS.2008.70
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
In this paper, we consider the problem of detecting whether a compromised router is maliciously manipulating its stream of packets. In particular, we are concerned with a simple yet effective attack in which a router selectively drops packets destined for some victim. Unfortunately, it is quite challenging to attribute a missing packet to a malicious action because normal network congestion can produce the same effect. Modern networks routinely drop packets when the load temporarily exceeds their buffering capacities. Previous detection protocols have tried to address this problem with a user-defined threshold: too many dropped packets imply malicious intent. However, this heuristic is fundamentally unsound; setting this threshold is, at best, an art and will certainly create unnecessary false positives or mask highly focused attacks. We have designed, developed, and implemented a compromised router detection protocol that dynamically infers, based on measured traffic rates and buffer sizes, the number of congestive packet losses that will occur. Once the ambiguity from congestion is removed, subsequent packet losses can be attributed to malicious actions. We have tested our protocol in Emulab and have studied its effectiveness in differentiating attacks from legitimate network behavior.
引用
收藏
页码:191 / 206
页数:16
相关论文
共 50 条
  • [11] Characterizing and Detecting Malicious Crowdsourcing
    Wang, Tianyi
    Wang, Gang
    Li, Xing
    Zheng, Haito
    Zhao, Ben Y.
    [J]. ACM SIGCOMM COMPUTER COMMUNICATION REVIEW, 2013, 43 (04) : 537 - 538
  • [12] Detecting Targeted Malicious Email
    Amin, Rohan M.
    Ryan, Julie J. C. H.
    van Dorp, J. Rene
    [J]. IEEE SECURITY & PRIVACY, 2012, 10 (03) : 64 - 71
  • [13] Detecting malicious groups of agents
    Braynov, S
    Jadliwala, M
    [J]. 2004 IEEE 1ST SYMPOSIUM ON MULTI-AGENT SECURITY & SURVIVABILITY, 2004, : 90 - 99
  • [14] Detecting Malicious Facebook Applications
    Rahman, Sazzadur
    Huang, Ting-Kai
    Madhyastha, Harsha V.
    Faloutsos, Michalis
    [J]. IEEE-ACM TRANSACTIONS ON NETWORKING, 2016, 24 (02) : 773 - 787
  • [15] An Approach for Detecting Malicious Keyloggers
    Howard, Adam
    Hu, Yi
    [J]. PROCEEDINGS OF THE 2012 INFORMATION SECURITY CURRICULUM DEVELOPMENT CONFERENCE (INFOSEC CD '12), 2012, : 53 - 56
  • [16] Detecting of Targeted Malicious Email
    Deshmukh, Priyanka
    Shelar, Megha
    Kulkarni, Nikhil
    [J]. 2014 IEEE GLOBAL CONFERENCE ON WIRELESS COMPUTING AND NETWORKING (GCWCN), 2014, : 199 - 202
  • [17] Detecting and isolating malicious routers
    Mizrak, Alper Tugay
    Cheng, Yu-Chung
    Marzullo, Keith
    Savage, Stefan
    [J]. IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2006, 3 (03) : 230 - 244
  • [18] Detecting malicious packet dropping using statistically regular traffic patterns in multihop wireless networks that are not bandwidth limited
    Rao, R
    Kesidis, G
    [J]. GLOBECOM'03: IEEE GLOBAL TELECOMMUNICATIONS CONFERENCE, VOLS 1-7, 2003, : 2957 - 2961
  • [19] Monitoring Agent for Detecting Malicious Packet Drops for Wireless Sensor Networks in the Microgrid and Grid-enabled Vehicles
    Ko, Jongbin
    Seo, Jungtaek
    Kim, Eui-Jik
    Shon, Taeshik
    [J]. INTERNATIONAL JOURNAL OF ADVANCED ROBOTIC SYSTEMS, 2012, 9
  • [20] Malicious Base Station and Detecting Malicious Base Station Signal
    Zhang Chen
    [J]. CHINA COMMUNICATIONS, 2014, 11 (08) : 59 - 64