DocumentCode :
3406930
Title :
Packet Scheduling Against Stepping-Stone Attacks with Chaff
Author :
He, Ting ; Venkitasubramaniam, Parvathinathan ; Tong, Lang
Author_Institution :
Sch. of Electr. & Comput. Eng., Cornell Univ., Ithaca, NY
fYear :
2006
fDate :
23-25 Oct. 2006
Firstpage :
1
Lastpage :
7
Abstract :
We consider scheduling packet transmissions in a network so that the efficiency of stepping-stone attacks can be severely restrained with the help of stepping-stone monitors. We allow the attacker to encrypt and pad the packets, perturb the timing of packets, and insert chaff packets, but the timing perturbation is subject to a maximum delay constraint. We show that if we randomize packet transmissions, then the attacker has to insert a large amount of chaff to evade detection completely. In particular, if all transmissions are scheduled as Poisson processes, then the fraction of attacking packets in the attacker´s traffic decreases exponentially with the length of the intrusion path
Keywords :
cryptography; packet switching; scheduling; stochastic processes; telecommunication traffic; Poisson process; attackers traffic; chaff packet; encryption; intrusion path; maximum delay constraint; packet scheduling; packet transmission; stepping-stone attacks; timing perturbation; Cryptography; Delay; Government; Helium; Processor scheduling; Relays; Scheduling algorithm; Telecommunication traffic; Timing; Watermarking; Network defense; Scheduling; Stepping-stone attack;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Military Communications Conference, 2006. MILCOM 2006. IEEE
Conference_Location :
Washington, DC
Print_ISBN :
1-4244-0617-X
Electronic_ISBN :
1-4244-0618-8
Type :
conf
DOI :
10.1109/MILCOM.2006.302353
Filename :
4086615
Link To Document :
بازگشت