ATTENTION: The works hosted here are being migrated to a new repository that will consolidate resources, improve discoverability, and better show UTA's research impact on the global community. We will update authors as the migration progresses. Please see MavMatrix for more information.
Show simple item record
dc.contributor.author | Venkateshaiah, Madhu | en_US |
dc.date.accessioned | 2007-08-23T01:56:35Z | |
dc.date.available | 2007-08-23T01:56:35Z | |
dc.date.issued | 2007-08-23T01:56:35Z | |
dc.date.submitted | December 2006 | en_US |
dc.identifier.other | DISS-1573 | en_US |
dc.identifier.uri | http://hdl.handle.net/10106/378 | |
dc.description.abstract | To gain anonymity and complicate their apprehension, attackers launch attacks not from their own systems but from previously compromised systems called stepping stones. An effective way to detect stepping stones is by comparing of incoming and outgoing connections in a network to find correlations.
For the sake of simplicity, earlier approaches ignore that an attacker can add chaff to a traffic stream. But in reality, the attacker may be able to modify applications to use cover traffic.
We loosen some assumptions made by earlier researchers and propose a simple buffering technique that could be used by an attacker to evade detection. In our technique, packets are buffered, and chaff packets added to generate constant rate traffic. To test the effectiveness of our technique, we choose a watermark based correlation scheme designed to correlate constant rate traffic streams and perform simulations to show that our buffering technique can successfully evade detection. | en_US |
dc.description.sponsorship | Wright, Matthew | en_US |
dc.language.iso | EN | en_US |
dc.publisher | Computer Science & Engineering | en_US |
dc.title | Evading Existing Stepping Stone Detection Methods Using Buffering | en_US |
dc.type | M.S. | en_US |
dc.contributor.committeeChair | Wright, Matthew | en_US |
dc.degree.department | Computer Science & Engineering | en_US |
dc.degree.discipline | Computer Science & Engineering | en_US |
dc.degree.grantor | University of Texas at Arlington | en_US |
dc.degree.level | masters | en_US |
dc.degree.name | M.S. | en_US |
dc.identifier.externalLink | https://www.uta.edu/ra/real/editprofile.php?onlyview=1&pid=215 | |
dc.identifier.externalLinkDescription | Link to Research Profiles | |
Files in this item
- Name:
- umi-uta-1573.pdf
- Size:
- 185.5Kb
- Format:
- PDF
This item appears in the following Collection(s)
Show simple item record