{"title":"基于TCP/IP包交叉匹配和rtt的随机漫步抵抗箔条攻击","authors":"Jianhua Yang","doi":"10.1109/AINA.2016.17","DOIUrl":null,"url":null,"abstract":"Many approaches have been proposed to detect stepping-stone intrusion, but few of them can effectively be resistant to intruders' manipulation, such as chaff perturbation, and time-jittering evasion techniques. In this paper, we propose a new approach to not only detect stepping-stone intrusion, but also resist intruders' chaff attack evasion through TCP/IP packet cross-matching and random walk. Unlike other approaches which can just resist intruders' chaff attack to a certain degree, this approach can be immune to any number packets injected. The theory analysis and simulation results show that more injection packets, the higher the probability that the chaff attack is detected.","PeriodicalId":438655,"journal":{"name":"2016 IEEE 30th International Conference on Advanced Information Networking and Applications (AINA)","volume":"20 4 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2016-03-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"5","resultStr":"{\"title\":\"Resistance to Chaff Attack through TCP/IP Packet Cross-Matching and RTT-Based Random Walk\",\"authors\":\"Jianhua Yang\",\"doi\":\"10.1109/AINA.2016.17\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Many approaches have been proposed to detect stepping-stone intrusion, but few of them can effectively be resistant to intruders' manipulation, such as chaff perturbation, and time-jittering evasion techniques. In this paper, we propose a new approach to not only detect stepping-stone intrusion, but also resist intruders' chaff attack evasion through TCP/IP packet cross-matching and random walk. Unlike other approaches which can just resist intruders' chaff attack to a certain degree, this approach can be immune to any number packets injected. The theory analysis and simulation results show that more injection packets, the higher the probability that the chaff attack is detected.\",\"PeriodicalId\":438655,\"journal\":{\"name\":\"2016 IEEE 30th International Conference on Advanced Information Networking and Applications (AINA)\",\"volume\":\"20 4 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2016-03-23\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"5\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2016 IEEE 30th International Conference on Advanced Information Networking and Applications (AINA)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/AINA.2016.17\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2016 IEEE 30th International Conference on Advanced Information Networking and Applications (AINA)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/AINA.2016.17","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Resistance to Chaff Attack through TCP/IP Packet Cross-Matching and RTT-Based Random Walk
Many approaches have been proposed to detect stepping-stone intrusion, but few of them can effectively be resistant to intruders' manipulation, such as chaff perturbation, and time-jittering evasion techniques. In this paper, we propose a new approach to not only detect stepping-stone intrusion, but also resist intruders' chaff attack evasion through TCP/IP packet cross-matching and random walk. Unlike other approaches which can just resist intruders' chaff attack to a certain degree, this approach can be immune to any number packets injected. The theory analysis and simulation results show that more injection packets, the higher the probability that the chaff attack is detected.