Localization attacks to internet threat monitors: Modeling and countermeasures

Wei Yu, Nan Zhang, Xinwen Fu, Riccardo Bettati, Wei Zhao

Research output: Contribution to journalArticlepeer-review

13 Scopus citations

Abstract

Internet Threat Monitoring (ITM) systems are a widely deployed facility to detect, analyze, and characterize dangerous Internet threats such as worms and distributed denial-of-service (DDoS) attacks. Nonetheless, an ITM system can also become the target of attacks. In this paper, we address localization attacks against ITM systems in which an attacker impairs the effectiveness of an ITM system by identifying the locations of ITM monitors. We propose an information-theoretic framework that models localization attacks as communication channels. Based on this model, we generalize all existing attacks as "temporal attacks, derive closed formulas of their performance, and propose an effective attack detection approach. The information-theoretic model also inspires a new attack called a spatial attack and motivates the corresponding detection approach. We show simulation results that support our theoretic findings.

Original languageEnglish (US)
Article number5453347
Pages (from-to)1655-1668
Number of pages14
JournalIEEE Transactions on Computers
Volume59
Issue number12
DOIs
StatePublished - 2010

All Science Journal Classification (ASJC) codes

  • Software
  • Theoretical Computer Science
  • Hardware and Architecture
  • Computational Theory and Mathematics

Fingerprint Dive into the research topics of 'Localization attacks to internet threat monitors: Modeling and countermeasures'. Together they form a unique fingerprint.

Cite this