Distributed Tracing of Intruders

Distributed Tracing of Intruders
Author: Stuart Gresley Staniford-Chen
Publisher:
Total Pages: 178
Release: 1995
Genre:
ISBN:


Download Distributed Tracing of Intruders Book in PDF, Epub and Kindle

Unwelcome intrusions into computer systems are being perpetrated by strangers, and the number of such incidents is rising steadily. One of the things that facilitates this malfeasance is that computer networks provide the ability for a user to log into multiple computer systems in sequence, changing identity with each step. This makes it very difficult to trace actions on a network of computers all the way back to their actual origins. We refer to this as the tracing problem. This thesis attempts to address this problem by the development of a technology called thumbprinting. Thumbprinting involves forming a signature of the data in a network connection. This signature is a small quantity which does not allow complete reconstruction of the data, but does allow comparison with signatures of other connections to determine with reasonable confidence whether the data were the same or not. This is a potential basis for a tracing system. The specific technology developed to perform this task is local thumbprinting. This involves forming linear combinations of the frequencies with which different characters occur in the network data sampled. The optimal linear combinations are chosen using a statistical methodology called principal component analysis. The difficulties which this process must overcome are outlined, and an algorithm for comparing the thumbprints which adaptively handles these difficulties is presented. A number of experiments with a trial implementation of this method are described. The method is shown to work successfully when given at least a minute and a half of reasonably active network connection. This requires presently about 20 bytes per minute per connection of storage for the thumbprints. In addition, the existing (very limited) literature on the tracing problem is reviewed.


Distributed Tracing of Intruders
Language: en
Pages: 178
Authors: Stuart Gresley Staniford-Chen
Categories:
Type: BOOK - Published: 1995 - Publisher:

GET EBOOK

Unwelcome intrusions into computer systems are being perpetrated by strangers, and the number of such incidents is rising steadily. One of the things that facil
Information Security
Language: en
Pages: 502
Authors: Agnes Hui Chan
Categories: Computers
Type: BOOK - Published: 2007-10-23 - Publisher: Springer

GET EBOOK

As distinct from other security and cryptography conferences, the Information Security Conference (ISC) 2002 brought together individuals involved in a wide var
Intrusion Detection
Language: en
Pages: 224
Authors: Edward G. Amoroso
Categories: Computers
Type: BOOK - Published: 1999 - Publisher:

GET EBOOK

Proceedings
Language: en
Pages: 172
Authors:
Categories: Computer networks
Type: BOOK - Published: 2000 - Publisher:

GET EBOOK

Formal Techniques for Distributed Systems
Language: en
Pages: 260
Authors: David Lee
Categories: Computers
Type: BOOK - Published: 2009-05-25 - Publisher: Springer Science & Business Media

GET EBOOK

This book constitutes the refereed proceedings of the 11th IFIP WG 6.1 International Conference on Formal Methods for Open Object-Based Distributed Systems, FMO