通过随机标记分析重建有意义的攻击图

P. Fazio, M. Tropea, S. Marano, M. Voznák
{"title":"通过随机标记分析重建有意义的攻击图","authors":"P. Fazio, M. Tropea, S. Marano, M. Voznák","doi":"10.1109/SPECTS.2016.7570519","DOIUrl":null,"url":null,"abstract":"Nowadays, the defense against Denial of Service (DoS) attacks is receiving particular interest. Different techniques have been proposed and, in particular, the Packet Marking (PM) and TraceBack (TB) procedures demonstrated a good capacity of facing the different malicious attacks. While host-based DoS attacks are more easily traced and managed, network-based DoS attacks are a more challenging threat. The powerful point of IP TB approach is the possibility given to routers to mark and add some information on attack packets, on the basis of a fixed probability value. In this paper, we propose a possible approach for modeling the classical probabilistic PM algorithms as Markov chains, giving the possibility to obtain a closed form for the evaluation of the right number of received marked packets, in order to build a meaningful attack graph.","PeriodicalId":302558,"journal":{"name":"2016 International Symposium on Performance Evaluation of Computer and Telecommunication Systems (SPECTS)","volume":"54 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2016-07-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"3","resultStr":"{\"title\":\"Meaningful attack graph reconstruction through stochastic marking analysis\",\"authors\":\"P. Fazio, M. Tropea, S. Marano, M. Voznák\",\"doi\":\"10.1109/SPECTS.2016.7570519\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Nowadays, the defense against Denial of Service (DoS) attacks is receiving particular interest. Different techniques have been proposed and, in particular, the Packet Marking (PM) and TraceBack (TB) procedures demonstrated a good capacity of facing the different malicious attacks. While host-based DoS attacks are more easily traced and managed, network-based DoS attacks are a more challenging threat. The powerful point of IP TB approach is the possibility given to routers to mark and add some information on attack packets, on the basis of a fixed probability value. In this paper, we propose a possible approach for modeling the classical probabilistic PM algorithms as Markov chains, giving the possibility to obtain a closed form for the evaluation of the right number of received marked packets, in order to build a meaningful attack graph.\",\"PeriodicalId\":302558,\"journal\":{\"name\":\"2016 International Symposium on Performance Evaluation of Computer and Telecommunication Systems (SPECTS)\",\"volume\":\"54 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2016-07-24\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"3\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2016 International Symposium on Performance Evaluation of Computer and Telecommunication Systems (SPECTS)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/SPECTS.2016.7570519\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2016 International Symposium on Performance Evaluation of Computer and Telecommunication Systems (SPECTS)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/SPECTS.2016.7570519","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 3

摘要

目前,对拒绝服务(DoS)攻击的防御受到了特别的关注。不同的技术已经被提出,特别是包标记(PM)和TraceBack (TB)过程显示出面对不同恶意攻击的良好能力。虽然基于主机的DoS攻击更容易跟踪和管理,但基于网络的DoS攻击是一种更具挑战性的威胁。IP TB方法的强大之处在于,路由器可以根据固定的概率值在攻击数据包上标记和添加一些信息。在本文中,我们提出了一种将经典概率PM算法建模为马尔可夫链的可能方法,从而有可能获得对接收到的标记数据包的正确数量进行评估的封闭形式,从而构建有意义的攻击图。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
Meaningful attack graph reconstruction through stochastic marking analysis
Nowadays, the defense against Denial of Service (DoS) attacks is receiving particular interest. Different techniques have been proposed and, in particular, the Packet Marking (PM) and TraceBack (TB) procedures demonstrated a good capacity of facing the different malicious attacks. While host-based DoS attacks are more easily traced and managed, network-based DoS attacks are a more challenging threat. The powerful point of IP TB approach is the possibility given to routers to mark and add some information on attack packets, on the basis of a fixed probability value. In this paper, we propose a possible approach for modeling the classical probabilistic PM algorithms as Markov chains, giving the possibility to obtain a closed form for the evaluation of the right number of received marked packets, in order to build a meaningful attack graph.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信