Nabs: a system for detecting resource abuses via characterization of flow content type

作者: K. Shanmugasundaram , M. Kharrazi , N. Memon

DOI: 10.1109/CSAC.2004.24

关键词: Payload (computing)Resource (project management)Security policyNetwork packetFlow networkComputer scienceComputer networkComputer securityContent managementDead Peer DetectionNetwork security

摘要: One of the growing problems faced by network administrators is abuse computing resources authorized and unauthorized personnel. The nature may vary from using applications to serving content. Proliferation peer-to-peer networks wide use tunnels makes it difficult detect such abuses easy circumvent security policies. This paper presents design implementation a system, called Nabs, that characterizes content types flows based solely on payload which can then be used identify resources. proposed method does not depend packet headers or other simple characteristics hence more robust circumvention.

参考文章(14)
Vern Paxson, Yin Zhang, Detecting stepping stones usenix security symposium. pp. 13- 13 ,(2000)
Gurmeet Singh Manku, Rajeev Motwani, Chapter 31 – Approximate Frequency Counts over Data Streams very large data bases. pp. 346- 357 ,(2002) , 10.1016/B978-155860869-6/50038-X
P. Pudil, J. Novovičová, J. Kittler, Floating search methods in feature selection Pattern Recognition Letters. ,vol. 15, pp. 1119- 1125 ,(1994) , 10.1016/0167-8655(94)90127-9
P. Somol, P. Pudil, J. Novovičová, P. Paclı́k, Adaptive floating search methods in feature selection Pattern Recognition Letters. ,vol. 20, pp. 1157- 1163 ,(1999) , 10.1016/S0167-8655(99)00083-5
Gurmeet Singh Manku, Rajeev Motwani, Approximate frequency counts over data streams Proceedings of the VLDB Endowment. ,vol. 5, pp. 1699- 1699 ,(2012) , 10.14778/2367502.2367508
R. Radhakrishnan, K. Shanmugasundaram, N. Memon, Data masking: a secure-covert channel paradigm multimedia signal processing. pp. 339- 342 ,(2002) , 10.1109/MMSP.2002.1203315
S. Staniford-Chen, L.T. Heberlein, Holding intruders accountable on the Internet ieee symposium on security and privacy. pp. 39- 49 ,(1995) , 10.1109/SECPRI.1995.398921
K.M.C. Tan, B.S. Collie, Detection and classification of TCP/IP network services annual computer security applications conference. pp. 99- 107 ,(1997) , 10.1109/CSAC.1997.646179