Graduation Semester and Year
2006
Language
English
Document Type
Thesis
Degree Name
Master of Science in Computer Science
Department
Computer Science and Engineering
First Advisor
Matthew Wright
Abstract
To gain anonymity and complicate their apprehension, attackers launch attacks not from their own systems but from previously compromised systems called stepping stones. An effective way to detect stepping stones is by comparing of incoming and outgoing connections in a network to find correlations. For the sake of simplicity, earlier approaches ignore that an attacker can add chaff to a traffic stream. But in reality, the attacker may be able to modify applications to use cover traffic. We loosen some assumptions made by earlier researchers and propose a simple buffering technique that could be used by an attacker to evade detection. In our technique, packets are buffered, and chaff packets added to generate constant rate traffic. To test the effectiveness of our technique, we choose a watermark based correlation scheme designed to correlate constant rate traffic streams and perform simulations to show that our buffering technique can successfully evade detection.
Disciplines
Computer Sciences | Physical Sciences and Mathematics
License
This work is licensed under a Creative Commons Attribution-NonCommercial-Share Alike 4.0 International License.
Recommended Citation
Venkateshaiah, Madhu, "Evading Existing Stepping Stone Detection Methods Using Buffering" (2006). Computer Science and Engineering Theses. 302.
https://mavmatrix.uta.edu/cse_theses/302
Comments
Degree granted by The University of Texas at Arlington