On the Research of Intrusion Tolerance Network Counter the Internet Flooding Attacks
博士 === 國立中央大學 === 資訊管理研究所 === 97 === Flooding based attack is always a critical threat to the Internet security. Due to the sophisticated hacking skills, nowadays, a lot of the modern malicious programs could cause global flooding attack in short period time. The zero-day polymorphic worms are the m...
Main Authors: | , |
---|---|
Other Authors: | |
Format: | Others |
Language: | en_US |
Published: |
2009
|
Online Access: | http://ndltd.ncl.edu.tw/handle/59su3h |
id |
ndltd-TW-097NCU05396094 |
---|---|
record_format |
oai_dc |
spelling |
ndltd-TW-097NCU053960942019-05-15T19:27:42Z http://ndltd.ncl.edu.tw/handle/59su3h On the Research of Intrusion Tolerance Network Counter the Internet Flooding Attacks 以入侵容錯網路對抗網際網路泛濫式攻擊之研究 Wen-Chen Sun 孫文駿 博士 國立中央大學 資訊管理研究所 97 Flooding based attack is always a critical threat to the Internet security. Due to the sophisticated hacking skills, nowadays, a lot of the modern malicious programs could cause global flooding attack in short period time. The zero-day polymorphic worms are the most pressing threat. The zero-day polymorphic worms not only exploit unknown vulnerabilities but also change their own representations on each new infection to evade detection. Therefore, the worms have the ability to rapidly infect a tremendous numbers of hosts and cause massive denial of service around the Internet. Even the network administrators could not remotely reconfigure the devices to recover services manually. These kinds of global flooding attacks are hard to be stopped by traditional security mechanisms which build single barrier system. Therefore, instead of trying to prevent the intrusion of every such a threat, we proposes a new system architecture, named VMITN (Virtual Machine based Intrusion Tolerance Network), which adopts the techniques of OOB (Out-of-Band) network and virtual machine to provide the global intrusion tolerance capabilities. The VMITN will tolerate the worm based flooding attacks until the administrator remove the vulnerability leveraged by the worm. We propose Seamless Rapidly Hand Over (SRHO) technique and GA-based Placement Selection (GAPS) technique to enhance the VMITN toleratance capability. To filter the zero day worms in early stage, two linear time detection algorithms, Quick Worm Pattern Learning (QWPL) and Rough Set Worm Detection (RSWD), are proposed and evaluated. We have implemented a concept proof prototype system and present the design and practical issues. Totally four famous worms attack events, including Code Red, Witty, Apache-Knacker and ATPhttpd, are tested in our experiments to evaluate the VMITN performance against various catastrophes. To prove the usefulness of VMITN, we not only emulate the real worm attack event in emulation network but also simulate a large scale network by NS-2 simulations. The results showed that our VMITN architecture can provide the reliability and survivability under severe worm attacks. Yi-Ming Chen 陳奕明 2009 學位論文 ; thesis 107 en_US |
collection |
NDLTD |
language |
en_US |
format |
Others
|
sources |
NDLTD |
description |
博士 === 國立中央大學 === 資訊管理研究所 === 97 === Flooding based attack is always a critical threat to the Internet security. Due to the sophisticated hacking skills, nowadays, a lot of the modern malicious programs could cause global flooding attack in short period time. The zero-day polymorphic worms are the most pressing threat. The zero-day polymorphic worms not only exploit unknown vulnerabilities but also change their own representations on each new infection to evade detection. Therefore, the worms have the ability to rapidly infect a tremendous numbers of hosts and cause massive denial of service around the Internet. Even the network administrators could not remotely reconfigure the devices to recover services manually.
These kinds of global flooding attacks are hard to be stopped by traditional security mechanisms which build single barrier system. Therefore, instead of trying to prevent the intrusion of every such a threat, we proposes a new system architecture, named VMITN (Virtual Machine based Intrusion Tolerance Network), which adopts the techniques of OOB (Out-of-Band) network and virtual machine to provide the global intrusion tolerance capabilities. The VMITN will tolerate the worm based flooding attacks until the administrator remove the vulnerability leveraged by the worm. We propose Seamless Rapidly Hand Over (SRHO) technique and GA-based Placement Selection (GAPS) technique to enhance the VMITN toleratance capability. To filter the zero day worms in early stage, two linear time detection algorithms, Quick Worm Pattern Learning (QWPL) and Rough Set Worm Detection (RSWD), are proposed and evaluated.
We have implemented a concept proof prototype system and present the design and practical issues. Totally four famous worms attack events, including Code Red, Witty, Apache-Knacker and ATPhttpd, are tested in our experiments to evaluate the VMITN performance against various catastrophes. To prove the usefulness of VMITN, we not only emulate the real worm attack event in emulation network but also simulate a large scale network by NS-2 simulations. The results showed that our VMITN architecture can provide the reliability and survivability under severe worm attacks.
|
author2 |
Yi-Ming Chen |
author_facet |
Yi-Ming Chen Wen-Chen Sun 孫文駿 |
author |
Wen-Chen Sun 孫文駿 |
spellingShingle |
Wen-Chen Sun 孫文駿 On the Research of Intrusion Tolerance Network Counter the Internet Flooding Attacks |
author_sort |
Wen-Chen Sun |
title |
On the Research of Intrusion Tolerance Network Counter the Internet Flooding Attacks |
title_short |
On the Research of Intrusion Tolerance Network Counter the Internet Flooding Attacks |
title_full |
On the Research of Intrusion Tolerance Network Counter the Internet Flooding Attacks |
title_fullStr |
On the Research of Intrusion Tolerance Network Counter the Internet Flooding Attacks |
title_full_unstemmed |
On the Research of Intrusion Tolerance Network Counter the Internet Flooding Attacks |
title_sort |
on the research of intrusion tolerance network counter the internet flooding attacks |
publishDate |
2009 |
url |
http://ndltd.ncl.edu.tw/handle/59su3h |
work_keys_str_mv |
AT wenchensun ontheresearchofintrusiontolerancenetworkcountertheinternetfloodingattacks AT sūnwénjùn ontheresearchofintrusiontolerancenetworkcountertheinternetfloodingattacks AT wenchensun yǐrùqīnróngcuòwǎnglùduìkàngwǎngjìwǎnglùfànlànshìgōngjīzhīyánjiū AT sūnwénjùn yǐrùqīnróngcuòwǎnglùduìkàngwǎngjìwǎnglùfànlànshìgōngjīzhīyánjiū |
_version_ |
1719089079801348096 |