DocumentCode :
2274540
Title :
CTCP: a transparent centralized TCP/IP architecture for network security
Author :
Hsu, Fu-Hau ; Chiueh, Tzi-cker
Author_Institution :
Dept. of Comput. Sci., State Univ. of New York, Stony Brook, NY, USA
fYear :
2004
fDate :
6-10 Dec. 2004
Firstpage :
335
Lastpage :
344
Abstract :
Many nework security problems can be solved in a centralized TCP (CTCP) architecture, in which an organization´s edge router transparently proxies every TCP connection between an internal host and an external host on the Internet. This paper describes the design, implementation, and evaluation of a CTCP router prototype that is built on the Linux kernel. By redirecting all packets targeting at nonexistent or nonopen-to-public ports to a CTCP socket which pretends to be the original receivers, CTCP could confirm the real identification of the packet sources, collect suspicious traffic from them, and make an illusion that the scanned target ports are all open, thus renders port scanning an useless effort. Under CTCP architecture, external hosts only interacts with a secure CTCP router; therefore, any OS fingerprinting attempt and DoS/DDoS attack targeting at TCP/IP implementation bugs could be thwarted. Moreover, By further checking traffic originating from confirmed scanners, the CTCP router can actually identify buffer overflow attack traffic. Finally, the CTCP router solves the TCP connection hijacking problem by introducing an additional check on the sequence number filed of incoming packets. Despite providing a rich variety of protection, the CTCP architecture does not incur much overhead. On a 1.1 GHz Pentium-3 machine with gigabit Ethernet interfaces, the throughput of the CTCP router is 420.3 Mbits/sec, whereas the throughput of a generic Linux router on the same hardware is only 409.1 Mbits/sec.
Keywords :
Internet; Linux; open systems; telecommunication network routing; telecommunication traffic; transport protocols; 1.1 GHz Pentium-3 machine; CTCP router prototype; Internet; Linux kernel; OS fingerprinting; gigabit Ethernet interface; network security; transparent centralized TCP/IP architecture; Computer crime; Fingerprint recognition; Internet; Kernel; Linux; Prototypes; RAKE receivers; Sockets; TCPIP; Throughput;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Computer Security Applications Conference, 2004. 20th Annual
ISSN :
1063-9527
Print_ISBN :
0-7695-2252-1
Type :
conf
DOI :
10.1109/CSAC.2004.14
Filename :
1377240
Link To Document :
بازگشت