Distributed Tracing of Intruders

Distributed Tracing of Intruders
Author :
Publisher :
Total Pages : 178
Release :
ISBN-10 : UCAL:X56727
ISBN-13 :
Rating : 4/5 (27 Downloads)

Book Synopsis Distributed Tracing of Intruders by : Stuart Gresley Staniford-Chen

Download or read book Distributed Tracing of Intruders written by Stuart Gresley Staniford-Chen and published by . This book was released on 1995 with total page 178 pages. Available in PDF, EPUB and Kindle. Book excerpt: Unwelcome intrusions into computer systems are being perpetrated by strangers, and the number of such incidents is rising steadily. One of the things that facilitates this malfeasance is that computer networks provide the ability for a user to log into multiple computer systems in sequence, changing identity with each step. This makes it very difficult to trace actions on a network of computers all the way back to their actual origins. We refer to this as the tracing problem. This thesis attempts to address this problem by the development of a technology called thumbprinting. Thumbprinting involves forming a signature of the data in a network connection. This signature is a small quantity which does not allow complete reconstruction of the data, but does allow comparison with signatures of other connections to determine with reasonable confidence whether the data were the same or not. This is a potential basis for a tracing system. The specific technology developed to perform this task is local thumbprinting. This involves forming linear combinations of the frequencies with which different characters occur in the network data sampled. The optimal linear combinations are chosen using a statistical methodology called principal component analysis. The difficulties which this process must overcome are outlined, and an algorithm for comparing the thumbprints which adaptively handles these difficulties is presented. A number of experiments with a trial implementation of this method are described. The method is shown to work successfully when given at least a minute and a half of reasonably active network connection. This requires presently about 20 bytes per minute per connection of storage for the thumbprints. In addition, the existing (very limited) literature on the tracing problem is reviewed.


Distributed Tracing of Intruders Related Books

Distributed Tracing of Intruders
Language: en
Pages: 178
Authors: Stuart Gresley Staniford-Chen
Categories:
Type: BOOK - Published: 1995 - Publisher:

DOWNLOAD EBOOK

Unwelcome intrusions into computer systems are being perpetrated by strangers, and the number of such incidents is rising steadily. One of the things that facil
Tracing Intruders behind Stepping Stones
Language: en
Pages:
Authors:
Categories:
Type: BOOK - Published: 2004 - Publisher:

DOWNLOAD EBOOK

Network based intruders seldom attack directly from their own hosts but rather stage their attacks through intermediate 'stepping stones' to conceal their ident
Information Security
Language: en
Pages: 502
Authors: Agnes Hui Chan
Categories: Computers
Type: BOOK - Published: 2007-10-23 - Publisher: Springer

DOWNLOAD EBOOK

As distinct from other security and cryptography conferences, the Information Security Conference (ISC) 2002 brought together individuals involved in a wide var
Tracing Intruders Behind Stepping Stones
Language: en
Pages: 143
Authors: Xinyuan Wang
Categories:
Type: BOOK - Published: 2004 - Publisher:

DOWNLOAD EBOOK

Keywords: Network Security, Correlation, Stepping Stones, Intrusion Tracing.
Intrusion Detection
Language: en
Pages: 224
Authors: Edward G. Amoroso
Categories: Computers
Type: BOOK - Published: 1999 - Publisher:

DOWNLOAD EBOOK