Detecting Malicious Packet Losses

In this paper, we consider the problem of detecting whether a compromised router is maliciously manipulating its stream of packets. In particular, we are concerned with a simple yet effective attack in which a router selectively drops packets destined for some victim. Unfortunately, it is quite chal...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:IEEE transactions on parallel and distributed systems 2009-02, Vol.20 (2), p.191-206
Hauptverfasser: Mzrak, Alper T., Savage, Stefan, Marzullo, Keith
Format: Artikel
Sprache:eng
Schlagworte:
Online-Zugang:Volltext bestellen
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page 206
container_issue 2
container_start_page 191
container_title IEEE transactions on parallel and distributed systems
container_volume 20
creator Mzrak, Alper T.
Savage, Stefan
Marzullo, Keith
description In this paper, we consider the problem of detecting whether a compromised router is maliciously manipulating its stream of packets. In particular, we are concerned with a simple yet effective attack in which a router selectively drops packets destined for some victim. Unfortunately, it is quite challenging to attribute a missing packet to a malicious action because normal network congestion can produce the same effect. Modern networks routinely drop packets when the load temporarily exceeds their buffering capacities. Previous detection protocols have tried to address this problem with a user-defined threshold: too many dropped packets imply malicious intent. However, this heuristic is fundamentally unsound; setting this threshold is, at best, an art and will certainly create unnecessary false positives or mask highly focused attacks. We have designed, developed, and implemented a compromised router detection protocol that dynamically infers, based on measured traffic rates and buffer sizes, the number of congestive packet losses that will occur. Once the ambiguity from congestion is removed, subsequent packet losses can be attributed to malicious actions. We have tested our protocol in Emulab and have studied its effectiveness in differentiating attacks from legitimate network behavior.
doi_str_mv 10.1109/TPDS.2008.70
format Article
fullrecord <record><control><sourceid>proquest_RIE</sourceid><recordid>TN_cdi_ieee_primary_4515859</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>4515859</ieee_id><sourcerecordid>1671281140</sourcerecordid><originalsourceid>FETCH-LOGICAL-c449t-fa75fd46805d7086a404cf5420ee81971d661781412766807917f998534fa8a63</originalsourceid><addsrcrecordid>eNp90T1PwzAQBmALgUQpbGwshQEYSLmzz18javmSiqhEmS0rdVBK2pQ4Hfj3OCpiYOjkGx69uvPL2CnCEBHs7Ww6fhtyADPUsMd6KKXJOBqxn2YgmVmO9pAdxbgAQJJAPXY-Dm3I23L1MXjxVZmX9SYOpj7_DO1gUscY4jE7KHwVw8nv22fvD_ez0VM2eX18Ht1NspzItlnhtSzmpAzIuQajPAHlhSQOIRi0GudKoTZIyLVKSlvUhbVGCiq88Ur02dU2d93UX5sQW7csYx6qyq9CWspZEIoLspjk5U4pSGipZRd5vROi0sgNIkGiF__oot40q3Sws8iBW8NNQjdblDfpa5pQuHVTLn3z7RBc14DrGnBdA053mWdbXoYQ_ihJlEZa8QMaSnym</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>912029828</pqid></control><display><type>article</type><title>Detecting Malicious Packet Losses</title><source>IEEE Electronic Library (IEL)</source><creator>Mzrak, Alper T. ; Savage, Stefan ; Marzullo, Keith</creator><creatorcontrib>Mzrak, Alper T. ; Savage, Stefan ; Marzullo, Keith</creatorcontrib><description>In this paper, we consider the problem of detecting whether a compromised router is maliciously manipulating its stream of packets. In particular, we are concerned with a simple yet effective attack in which a router selectively drops packets destined for some victim. Unfortunately, it is quite challenging to attribute a missing packet to a malicious action because normal network congestion can produce the same effect. Modern networks routinely drop packets when the load temporarily exceeds their buffering capacities. Previous detection protocols have tried to address this problem with a user-defined threshold: too many dropped packets imply malicious intent. However, this heuristic is fundamentally unsound; setting this threshold is, at best, an art and will certainly create unnecessary false positives or mask highly focused attacks. We have designed, developed, and implemented a compromised router detection protocol that dynamically infers, based on measured traffic rates and buffer sizes, the number of congestive packet losses that will occur. Once the ambiguity from congestion is removed, subsequent packet losses can be attributed to malicious actions. We have tested our protocol in Emulab and have studied its effectiveness in differentiating attacks from legitimate network behavior.</description><identifier>ISSN: 1045-9219</identifier><identifier>EISSN: 1558-2183</identifier><identifier>DOI: 10.1109/TPDS.2008.70</identifier><identifier>CODEN: ITDSEO</identifier><language>eng</language><publisher>New York: IEEE</publisher><subject>Ambiguity ; Buffers ; Communication system traffic control ; Congestion ; distributed systems ; Internet ; Internet dependability ; Intrusion detection ; intrusion detection and tolerance ; Loss measurement ; malicious routers ; Networks ; Protocol (computers) ; reliable networks ; Routers ; Routing protocols ; Size measurement ; Streams ; Studies ; Telecommunication traffic ; Testing ; Thresholds</subject><ispartof>IEEE transactions on parallel and distributed systems, 2009-02, Vol.20 (2), p.191-206</ispartof><rights>Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2009</rights><lds50>peer_reviewed</lds50><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c449t-fa75fd46805d7086a404cf5420ee81971d661781412766807917f998534fa8a63</citedby><cites>FETCH-LOGICAL-c449t-fa75fd46805d7086a404cf5420ee81971d661781412766807917f998534fa8a63</cites></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/4515859$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>314,780,784,796,27924,27925,54758</link.rule.ids><linktorsrc>$$Uhttps://ieeexplore.ieee.org/document/4515859$$EView_record_in_IEEE$$FView_record_in_$$GIEEE</linktorsrc></links><search><creatorcontrib>Mzrak, Alper T.</creatorcontrib><creatorcontrib>Savage, Stefan</creatorcontrib><creatorcontrib>Marzullo, Keith</creatorcontrib><title>Detecting Malicious Packet Losses</title><title>IEEE transactions on parallel and distributed systems</title><addtitle>TPDS</addtitle><description>In this paper, we consider the problem of detecting whether a compromised router is maliciously manipulating its stream of packets. In particular, we are concerned with a simple yet effective attack in which a router selectively drops packets destined for some victim. Unfortunately, it is quite challenging to attribute a missing packet to a malicious action because normal network congestion can produce the same effect. Modern networks routinely drop packets when the load temporarily exceeds their buffering capacities. Previous detection protocols have tried to address this problem with a user-defined threshold: too many dropped packets imply malicious intent. However, this heuristic is fundamentally unsound; setting this threshold is, at best, an art and will certainly create unnecessary false positives or mask highly focused attacks. We have designed, developed, and implemented a compromised router detection protocol that dynamically infers, based on measured traffic rates and buffer sizes, the number of congestive packet losses that will occur. Once the ambiguity from congestion is removed, subsequent packet losses can be attributed to malicious actions. We have tested our protocol in Emulab and have studied its effectiveness in differentiating attacks from legitimate network behavior.</description><subject>Ambiguity</subject><subject>Buffers</subject><subject>Communication system traffic control</subject><subject>Congestion</subject><subject>distributed systems</subject><subject>Internet</subject><subject>Internet dependability</subject><subject>Intrusion detection</subject><subject>intrusion detection and tolerance</subject><subject>Loss measurement</subject><subject>malicious routers</subject><subject>Networks</subject><subject>Protocol (computers)</subject><subject>reliable networks</subject><subject>Routers</subject><subject>Routing protocols</subject><subject>Size measurement</subject><subject>Streams</subject><subject>Studies</subject><subject>Telecommunication traffic</subject><subject>Testing</subject><subject>Thresholds</subject><issn>1045-9219</issn><issn>1558-2183</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2009</creationdate><recordtype>article</recordtype><sourceid>RIE</sourceid><recordid>eNp90T1PwzAQBmALgUQpbGwshQEYSLmzz18javmSiqhEmS0rdVBK2pQ4Hfj3OCpiYOjkGx69uvPL2CnCEBHs7Ww6fhtyADPUsMd6KKXJOBqxn2YgmVmO9pAdxbgAQJJAPXY-Dm3I23L1MXjxVZmX9SYOpj7_DO1gUscY4jE7KHwVw8nv22fvD_ez0VM2eX18Ht1NspzItlnhtSzmpAzIuQajPAHlhSQOIRi0GudKoTZIyLVKSlvUhbVGCiq88Ur02dU2d93UX5sQW7csYx6qyq9CWspZEIoLspjk5U4pSGipZRd5vROi0sgNIkGiF__oot40q3Sws8iBW8NNQjdblDfpa5pQuHVTLn3z7RBc14DrGnBdA053mWdbXoYQ_ihJlEZa8QMaSnym</recordid><startdate>20090201</startdate><enddate>20090201</enddate><creator>Mzrak, Alper T.</creator><creator>Savage, Stefan</creator><creator>Marzullo, Keith</creator><general>IEEE</general><general>The Institute of Electrical and Electronics Engineers, Inc. (IEEE)</general><scope>97E</scope><scope>RIA</scope><scope>RIE</scope><scope>AAYXX</scope><scope>CITATION</scope><scope>7SC</scope><scope>7SP</scope><scope>8FD</scope><scope>JQ2</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope><scope>F28</scope><scope>FR3</scope></search><sort><creationdate>20090201</creationdate><title>Detecting Malicious Packet Losses</title><author>Mzrak, Alper T. ; Savage, Stefan ; Marzullo, Keith</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c449t-fa75fd46805d7086a404cf5420ee81971d661781412766807917f998534fa8a63</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2009</creationdate><topic>Ambiguity</topic><topic>Buffers</topic><topic>Communication system traffic control</topic><topic>Congestion</topic><topic>distributed systems</topic><topic>Internet</topic><topic>Internet dependability</topic><topic>Intrusion detection</topic><topic>intrusion detection and tolerance</topic><topic>Loss measurement</topic><topic>malicious routers</topic><topic>Networks</topic><topic>Protocol (computers)</topic><topic>reliable networks</topic><topic>Routers</topic><topic>Routing protocols</topic><topic>Size measurement</topic><topic>Streams</topic><topic>Studies</topic><topic>Telecommunication traffic</topic><topic>Testing</topic><topic>Thresholds</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Mzrak, Alper T.</creatorcontrib><creatorcontrib>Savage, Stefan</creatorcontrib><creatorcontrib>Marzullo, Keith</creatorcontrib><collection>IEEE All-Society Periodicals Package (ASPP) 2005-present</collection><collection>IEEE All-Society Periodicals Package (ASPP) 1998-Present</collection><collection>IEEE Electronic Library (IEL)</collection><collection>CrossRef</collection><collection>Computer and Information Systems Abstracts</collection><collection>Electronics &amp; Communications Abstracts</collection><collection>Technology Research Database</collection><collection>ProQuest Computer Science Collection</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts – Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><collection>ANTE: Abstracts in New Technology &amp; Engineering</collection><collection>Engineering Research Database</collection><jtitle>IEEE transactions on parallel and distributed systems</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Mzrak, Alper T.</au><au>Savage, Stefan</au><au>Marzullo, Keith</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Detecting Malicious Packet Losses</atitle><jtitle>IEEE transactions on parallel and distributed systems</jtitle><stitle>TPDS</stitle><date>2009-02-01</date><risdate>2009</risdate><volume>20</volume><issue>2</issue><spage>191</spage><epage>206</epage><pages>191-206</pages><issn>1045-9219</issn><eissn>1558-2183</eissn><coden>ITDSEO</coden><abstract>In this paper, we consider the problem of detecting whether a compromised router is maliciously manipulating its stream of packets. In particular, we are concerned with a simple yet effective attack in which a router selectively drops packets destined for some victim. Unfortunately, it is quite challenging to attribute a missing packet to a malicious action because normal network congestion can produce the same effect. Modern networks routinely drop packets when the load temporarily exceeds their buffering capacities. Previous detection protocols have tried to address this problem with a user-defined threshold: too many dropped packets imply malicious intent. However, this heuristic is fundamentally unsound; setting this threshold is, at best, an art and will certainly create unnecessary false positives or mask highly focused attacks. We have designed, developed, and implemented a compromised router detection protocol that dynamically infers, based on measured traffic rates and buffer sizes, the number of congestive packet losses that will occur. Once the ambiguity from congestion is removed, subsequent packet losses can be attributed to malicious actions. We have tested our protocol in Emulab and have studied its effectiveness in differentiating attacks from legitimate network behavior.</abstract><cop>New York</cop><pub>IEEE</pub><doi>10.1109/TPDS.2008.70</doi><tpages>16</tpages><oa>free_for_read</oa></addata></record>
fulltext fulltext_linktorsrc
identifier ISSN: 1045-9219
ispartof IEEE transactions on parallel and distributed systems, 2009-02, Vol.20 (2), p.191-206
issn 1045-9219
1558-2183
language eng
recordid cdi_ieee_primary_4515859
source IEEE Electronic Library (IEL)
subjects Ambiguity
Buffers
Communication system traffic control
Congestion
distributed systems
Internet
Internet dependability
Intrusion detection
intrusion detection and tolerance
Loss measurement
malicious routers
Networks
Protocol (computers)
reliable networks
Routers
Routing protocols
Size measurement
Streams
Studies
Telecommunication traffic
Testing
Thresholds
title Detecting Malicious Packet Losses
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-04T19%3A46%3A27IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_RIE&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Detecting%20Malicious%20Packet%20Losses&rft.jtitle=IEEE%20transactions%20on%20parallel%20and%20distributed%20systems&rft.au=Mzrak,%20Alper%20T.&rft.date=2009-02-01&rft.volume=20&rft.issue=2&rft.spage=191&rft.epage=206&rft.pages=191-206&rft.issn=1045-9219&rft.eissn=1558-2183&rft.coden=ITDSEO&rft_id=info:doi/10.1109/TPDS.2008.70&rft_dat=%3Cproquest_RIE%3E1671281140%3C/proquest_RIE%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=912029828&rft_id=info:pmid/&rft_ieee_id=4515859&rfr_iscdi=true