4.5 Article

Localization Attacks to Internet Threat Monitors: Modeling and Countermeasures

Journal

IEEE TRANSACTIONS ON COMPUTERS
Volume 59, Issue 12, Pages 1655-1668

Publisher

IEEE COMPUTER SOC
DOI: 10.1109/TC.2010.88

Keywords

Internet threat monitoring systems; localization attack; modeling; defense

Funding

  1. US National Science Foundation (NSF) [0943479, 0907964, 0852673, 0852674, 0845644, 0915834, 0808419, 0324988, 0721571, 0329181, 0963973, 0963979]
  2. University of Macau, and Macao Science and Technology Development Foundation
  3. Direct For Computer & Info Scie & Enginr
  4. Division Of Computer and Network Systems [0963973, 0324988] Funding Source: National Science Foundation
  5. Direct For Computer & Info Scie & Enginr
  6. Division Of Computer and Network Systems [0808419, 0958477, 0907964, 0963979] Funding Source: National Science Foundation
  7. Direct For Computer & Info Scie & Enginr
  8. Division of Computing and Communication Foundations [0329181, 0943479] Funding Source: National Science Foundation
  9. Direct For Computer & Info Scie & Enginr
  10. Div Of Information & Intelligent Systems [0845644] Funding Source: National Science Foundation

Ask authors/readers for more resources

Internet Threat Monitoring (ITM) systems are a widely deployed facility to detect, analyze, and characterize dangerous Internet threats such as worms and distributed denial-of-service (DDoS) attacks. Nonetheless, an ITM system can also become the target of attacks. In this paper, we address localization attacks against ITM systems in which an attacker impairs the effectiveness of an ITM system by identifying the locations of ITM monitors. We propose an information-theoretic framework that models localization attacks as communication channels. Based on this model, we generalize all existing attacks as temporal attacks, derive closed formulas of their performance, and propose an effective attack detection approach. The information-theoretic model also inspires a new attack called a spatial attack and motivates the corresponding detection approach. We show simulation results that support our theoretic findings.

Authors

I am an author on this paper
Click your name to claim this paper and add it to your profile.

Reviews

Primary Rating

4.5
Not enough ratings

Secondary Ratings

Novelty
-
Significance
-
Scientific rigor
-
Rate this paper

Recommended

No Data Available
No Data Available