• DocumentCode
    3406930
  • Title

    Packet Scheduling Against Stepping-Stone Attacks with Chaff

  • Author

    He, Ting ; Venkitasubramaniam, Parvathinathan ; Tong, Lang

  • Author_Institution
    Sch. of Electr. & Comput. Eng., Cornell Univ., Ithaca, NY
  • fYear
    2006
  • fDate
    23-25 Oct. 2006
  • Firstpage
    1
  • Lastpage
    7
  • Abstract
    We consider scheduling packet transmissions in a network so that the efficiency of stepping-stone attacks can be severely restrained with the help of stepping-stone monitors. We allow the attacker to encrypt and pad the packets, perturb the timing of packets, and insert chaff packets, but the timing perturbation is subject to a maximum delay constraint. We show that if we randomize packet transmissions, then the attacker has to insert a large amount of chaff to evade detection completely. In particular, if all transmissions are scheduled as Poisson processes, then the fraction of attacking packets in the attacker´s traffic decreases exponentially with the length of the intrusion path
  • Keywords
    cryptography; packet switching; scheduling; stochastic processes; telecommunication traffic; Poisson process; attackers traffic; chaff packet; encryption; intrusion path; maximum delay constraint; packet scheduling; packet transmission; stepping-stone attacks; timing perturbation; Cryptography; Delay; Government; Helium; Processor scheduling; Relays; Scheduling algorithm; Telecommunication traffic; Timing; Watermarking; Network defense; Scheduling; Stepping-stone attack;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Military Communications Conference, 2006. MILCOM 2006. IEEE
  • Conference_Location
    Washington, DC
  • Print_ISBN
    1-4244-0617-X
  • Electronic_ISBN
    1-4244-0618-8
  • Type

    conf

  • DOI
    10.1109/MILCOM.2006.302353
  • Filename
    4086615