期刊论文详细信息
Journal of Systemics, Cybernetics and Informatics
Correlating Temporal Thumbprints for Tracing Intruders
Shou-Hsuan Stephen Huang1  Jianhua Yang2 
[1] The Department of Computer Science, University of Houston;The Department of Mathmatics and Computer Science, Bennett College;
关键词: Stepping-stone;    traceback;    Temporal Thumbprint;    Intrusion Detection;    Network Security;   
DOI  :  
来源: DOAJ
【 摘 要 】

The Design of TCP/IP protocol makes it difficult to reliably traceback to the original attackers if they obscure their identities by logging through a chain of multiple hosts. A thumbprint method based on connection content was proposed in 1995 to traceback attackers, but this method is limited to non-encrypted sessions. In this paper, we propose a thumbprint based on time intervals, T-thumbprint, to identify a connection. T-thumbprint is a sequence of time gaps between adjacent TCP 'Send' packets of an interactive terminal session. An algorithm is presented to correlate two T-thumbprints to see if they belong to the same connection chain. We also discuss how to use T-thumbprints to traceback an attacker on the Internet, and how to defeat at-tacker's manipulation. T-thumbprint has advantages of: (1) It can be applied to encrypt sessions; (2) It does not require tightly synchronized clocks; (3) It can defeat attacker's manipulation to some extent; and (4) It is efficient, can be used to trace attackers in real time.

【 授权许可】

Unknown   

  文献评价指标  
  下载次数:0次 浏览次数:3次