Skip to main content

2001 | OriginalPaper | Buchkapitel

Sleepy Watermark Tracing: An Active Network-Based Intrusion Response Framework

verfasst von : Xinyuan Wang, Douglas S. Reeves, S. Felix Wu, Jim Yuill

Erschienen in: Trusted Information

Verlag: Springer US

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Network-based intrusion has become a serious threat to today’s highly networked information systems, yet the overwhelming majority of current network security mechanisms are “passive” in response to network-based attacks. In particular, tracing and detection of the source of network-based intrusion has been left largely untouched in existing intrusion detection mechanisms. The fact that intruders can log in through a series of hosts before attacking the final target makes it extremely difficult to trace back the real source of network-based intrusions.In this paper, we apply active networking principles to address the problem of tracing network-based intrusion with such chained connections, and propose a novel intrusion response framework: Sleepy Watermark Tracing (SWT). SWT is sleepy“ in that it does not introduce overhead when no intrusion is detected. Yet it is “active” in that when an intrusion is detected, the target will inject a watermark into the backward connection of the intrusion, and wake up and collaborate with intermediate routers along the intrusion path. By integrating a sleepy intrusion response scheme, a watermark correlation technique and an active tracing protocol, SWT provides a highly efficient and accurate source tracing on interactive intrusions through chained telnet or rlogin. Our prototype shows that SWT can trace back to the farthest trustworthy security gateway to the origin of intrusion, within one keystroke by the intruder. With its unique active tracing, SWT can even trace when intrusion connections are idle. prototype shows that SWT can trace back to the farthest trustworthy security gateway to the origin of intrusion, within one keystroke by the intruder. With its unique active tracing, SWT can even trace when intrusion connections are idle.

Metadaten
Titel
Sleepy Watermark Tracing: An Active Network-Based Intrusion Response Framework
verfasst von
Xinyuan Wang
Douglas S. Reeves
S. Felix Wu
Jim Yuill
Copyright-Jahr
2001
Verlag
Springer US
DOI
https://doi.org/10.1007/0-306-46998-7_26

Premium Partner