A Technique for Network Topology Deception

作者: Samuel T. Trassare , Robert Beverly , David Alderson

DOI: 10.1109/MILCOM.2013.303

关键词:

摘要: Civilian and military networks are continually probed for vulnerabilities. Cyber criminals, autonomous botnets under their control, regularly scan in search of vulnerable systems to co-opt. Military more sophisticated adversaries may also map as part reconnaissance intelligence gathering. This paper focuses on attempting a network's infrastructure, i.e., the critical routers links supporting network. We develop novel methodology, rooted principles deception, deceiving malicious traceroute probe influencing structure network inferred by mapping adversary. Our Linux-based implementation runs kernel module at border router present deceptive external topology. construct proof-of-concept test show that remote adversary using defended can be presented with false topology defender's choice.

参考文章(14)
Farnam Jahanian, G. Robert Malan, Matthew Smart, Defeating TCP/IP stack fingerprinting usenix security symposium. pp. 17- 17 ,(2000)
Erwin E Frederick, Testing a Low-Interaction Honeypot against Live Cyber Attackers Monterey, California. Naval Postgraduate School. ,(2011)
L. Spitzner, Honeypots: Tracking Hackers ,(2002)
David Malone, Matthew Luckie, Analysis of ICMP quotations passive and active network measurement. pp. 228- 232 ,(2007) , 10.1007/978-3-540-71617-4_24
Samuel T Trassare, A Technique for Presenting a Deceptive Dynamic Network Topology Naval Postgraduate School (U.S.). ,(2013)
Robert Beverly, A Robust Classifier for Passive TCP/IP Fingerprinting passive and active network measurement. pp. 158- 167 ,(2004) , 10.1007/978-3-540-24668-8_16
Linton C. Freeman, A Set of Measures of Centrality Based on Betweenness Sociometry. ,vol. 40, pp. 35- 41 ,(1977) , 10.2307/3033543
Barton Whaley, Toward a general theory of deception Journal of Strategic Studies. ,vol. 5, pp. 178- 192 ,(1982) , 10.1080/01402398208437106
Brice Augustin, Xavier Cuvellier, Benjamin Orgogozo, Fabien Viger, Timur Friedman, Matthieu Latapy, Clémence Magnien, Renata Teixeira, Avoiding traceroute anomalies with Paris traceroute internet measurement conference. pp. 153- 158 ,(2006) , 10.1145/1177080.1177100