DocumentCode
2493334
Title
Lightweight scheme for generating stealthy probes
Author
Ganesh, Shriram ; Sethi, Adarshpal ; Hardy, Rommie
Author_Institution
Univ. of Delaware, Newark, DE, USA
fYear
2009
fDate
25-28 Oct. 2009
Firstpage
212
Lastpage
218
Abstract
Probing based approaches have been effectively used for network monitoring in the past. Probes such as ICMP pings provide an effective tool for detecting compromised nodes which try to delay or drop traffic. But an intelligent attacker may evade detection by giving preferential treatment to probe traffic. This is usually possible because probe packets have a different format from regular application packets and are easily distinguishable. The solution to this problem is to create stealthy probes which are indistinguishable from normal application traffic. In this paper, we build upon our earlier work on the design approaches for stealthy probing, and we propose a lightweight and effective scheme for generating stealthy probes.
Keywords
telecommunication network topology; telecommunication security; telecommunication traffic; ICMP pings; intelligent attacker; network monitoring; probe packets; stealthy probes; Collaborative work; Condition monitoring; Delay effects; Government; Intrusion detection; Laboratories; Probes; Robustness; Telecommunication traffic; Testing; intrusion detection; network management; packet stamping; stealthy probing;
fLanguage
English
Publisher
ieee
Conference_Titel
Design of Reliable Communication Networks, 2009. DRCN 2009. 7th International Workshop on
Conference_Location
Washington, DC
Print_ISBN
978-1-4244-5047-3
Electronic_ISBN
978-1-4244-5048-0
Type
conf
DOI
10.1109/DRCN.2009.5340003
Filename
5340003
Link To Document