UM
Residential Collegefalse
Status已發表Published
An invisible localization attack to internet threat monitors
Yu, Wei1; Wang, Xun2; Fu, Xinwen3; Xuan, Dong4; Zhao, Wei5
2018-09-20
Source PublicationIEEE Transactions on Parallel and Distributed Systems
ISSN10459219
Volume20Issue:11Pages:1611-1625
Abstract

Internet threat monitoring (ITM) systems have been deployed to detect widespread attacks on the Internet in recent years. However, the effectiveness of ITM systems critically depends on the confidentiality of the location of their monitors. If adversaries learn the monitor locations of an ITM system, they can bypass the monitors and focus on the uncovered IP address space without being detected. In this paper, we study a new class of attacks, the invisible LOCalization (iLOC) attack. The iLOC attack can accurately and invisibly localize monitors of ITM systems. In the iLOC attack, the attacker launches low-rate port-scan traffic, encoded with a selected pseudonoise code (PN-code), to targeted networks. While the secret PN-code is invisible to others, the attacker can accurately determine the existence of monitors in the targeted networks based on whether the PN-code is embedded in the report data queried from the data center of the ITM system. We formally analyze the impact of various parameters on attack effectiveness. We implement the iLOC attack and conduct the performance evaluation on a real-world ITM system to demonstrate the possibility of such attacks. We also conduct extensive simulations on the iLOC attack using real-world traces. Our data show that the iLOC attack can accurately identify monitors while being invisible to ITM systems. Finally, we present a set of guidelines to counteract the iLOC attack. © 2009 IEEE.

DOI10.1109/TPDS.2008.255
Language英語English
WOS IDWOS:000270095700005
The Source to ArticleEngineering Village
Scopus ID2-s2.0-70350057094
Fulltext Access
Citation statistics
Document TypeJournal article
CollectionUniversity of Macau
Affiliation1.Department of Computer and Information Sciences, Towson University, Towson, MD 21252, United States;
2.Cisco Systems, Inc., San Jose, CA 95134, United States;
3.Department of Computer Science, University of Massachusetts Lowell, Lowell, MA 01854, United States;
4.Department of Computer Science and Engineering, Ohio State University, 2015 Neil Avenue, Columbus, OH 43210, United States;
5.University of Macau, Av. Padre Toms Pereira, Taipa, China
Recommended Citation
GB/T 7714
Yu, Wei,Wang, Xun,Fu, Xinwen,et al. An invisible localization attack to internet threat monitors[J]. IEEE Transactions on Parallel and Distributed Systems, 2018, 20(11), 1611-1625.
APA Yu, Wei., Wang, Xun., Fu, Xinwen., Xuan, Dong., & Zhao, Wei (2018). An invisible localization attack to internet threat monitors. IEEE Transactions on Parallel and Distributed Systems, 20(11), 1611-1625.
MLA Yu, Wei,et al."An invisible localization attack to internet threat monitors".IEEE Transactions on Parallel and Distributed Systems 20.11(2018):1611-1625.
Files in This Item:
There are no files associated with this item.
Related Services
Recommend this item
Bookmark
Usage statistics
Export to Endnote
Google Scholar
Similar articles in Google Scholar
[Yu, Wei]'s Articles
[Wang, Xun]'s Articles
[Fu, Xinwen]'s Articles
Baidu academic
Similar articles in Baidu academic
[Yu, Wei]'s Articles
[Wang, Xun]'s Articles
[Fu, Xinwen]'s Articles
Bing Scholar
Similar articles in Bing Scholar
[Yu, Wei]'s Articles
[Wang, Xun]'s Articles
[Fu, Xinwen]'s Articles
Terms of Use
No data!
Social Bookmark/Share
All comments (0)
No comment.
 

Items in the repository are protected by copyright, with all rights reserved, unless otherwise indicated.