Loading...
Please wait, while we are loading the content...
Similar Documents
Iloc: an invisible localization attack to internet threat monitoring systems.
| Content Provider | CiteSeerX |
|---|---|
| Author | Fu, Xinwen Xuan, Dong Zhao, Wei Yu, Wei Wang, Xun |
| Abstract | Abstract—Internet threat monitoring (ITM) systems have been deployed to detect widespread threats and attacks on the Internet in recent years. However, the integrity and functionality of these systems largely depend on the location anonymity of their monitors. If the locations of monitors are disclosed, the attacker can bypass the monitors or even abuse them, significantly jeopardizing the performance of ITM systems. In this paper, we study a new class of attacks, the invisible LOCalization (iLOC) attack. The iLOC attack can accurately and invisibly localize monitors of ITM systems. In the iLOC attack, the attacker launches low-rate port-scan traffic, encoded with a selected pseudo-noise code (PNcode), to targeted networks. While the secret PN-code is invisible to others, the attacker can accurately determine the existence of monitors in the targeted networks based on whether the PNcode is embedded in the report data queried from the data center of the ITM system. We implement the iLOC attack and conduct experiments on a real-world ITM system to validate the feasibility of such attacks. We also conduct extensive simulations on the iLOC attack using real-world traces. Our data demonstrate that the iLOC attack can accurately identify monitors while remaining invisible to the ITM. Finally, we present a set of guidelines to counteract the iLOC attack. Index Terms—Internet threat monitoring systems, Invisible localization attack, PN-code, Security |
| File Format | |
| Access Restriction | Open |
| Subject Keyword | Conduct Experiment New Class Data Demonstrate Real-world Itm System Internet Threat Monitoring System Data Center Extensive Simulation Pseudo-noise Code Invisible Localization Targeted Network Real-world Trace Location Anonymity Low-rate Port-scan Traffic Invisible Localization Attack Localize Monitor Abstract Internet Threat Monitoring Widespread Threat Iloc Attack Index Term Internet Threat Itm System Recent Year Secret Pn-code Report Data |
| Content Type | Text |