Title :
A Study on Noise-Tolerant PN Code-Based Localization Attacks to Internet Threat Monitors by Exploiting Multiple Ports
Author :
Narita, Masaki ; Bista, Bhed Bahadur ; Takata, Toyoo
Author_Institution :
Grad. Sch. of Software & Inf. Sci., Iwate Prefectural Univ., Iwate, Japan
Abstract :
Internet threat monitoring systems are studied and developed to comprehend the malicious activities on the Internet. On the other hand, it is known that attackers devise a technique that locates the deployment of sensors that constitute the monitoring system. This technique is called as localization attacks to Internet threat monitors. If attackers can detect sensors, they can evade them when they initiate the malicious activities. The latest method can detect sensors with low probing traffic volume compared with the previous one because it adopts PN (Pseudo Noise) code-based scheme inspired from the spread spectrum technology. However, when other monitoring packets interfere as a strong noise, the detection accuracy of the method decreases. For this reason, we need to make elaborate preparations under the assumption that attackers improve the PN code-based method to boost resistance to a strong noise by exploiting multiple ports, rather than by a single port for detecting a sensor. Therefore, we devised the noise-tolerant PN code-based localization attack from a standpoint of attackers for the security research. Performance evaluation was conducted based on the real Internet monitoring dataset. In this paper, we show the detection accuracy and the stealthiness of our devised method compared with the existing one.
Keywords :
Internet; computer network performance evaluation; computer network security; sensor placement; telecommunication traffic; Internet monitoring dataset; Internet threat monitoring systems; PN code-based scheme; detection accuracy; malicious activities; monitoring packets; noise-tolerant PN code-based localization attack; noise-tolerant PN code-based localization attacks; performance evaluation; pseudonoise code-based scheme; security research; sensor deployment; spread spectrum technology; traffic volume; Accuracy; Correlation; Internet; Monitoring; Noise; Ports (Computers); Sensors; Internet threat monitoring; detection accuracy; localization attacks; noise tolerance; pseudo noise code;
Conference_Titel :
Advanced Information Networking and Applications (AINA), 2013 IEEE 27th International Conference on
Conference_Location :
Barcelona
Print_ISBN :
978-1-4673-5550-6
Electronic_ISBN :
1550-445X
DOI :
10.1109/AINA.2013.30