Abstract
Hackers hide behind compromised intermediate hosts and pose advanced persistent threats (APTs). The compromised hosts are used as stepping stones to launch real attacks, as is evident from an incident that shook the world in 2016 - Panama Papers Leak. The major attack would not go unnoticed if the compromised stepping stone, in this case an email server, could be identified in time. In this paper, we explore how today's programmable networks could be retrofitted with effective stepping stone detection mechanisms to correlate flows. We share initial results to prove that such a setup exists. Lastly, we analyze scalability issues associated with the setup and explore recent developments in network monitoring which have potential to address these issues.
Original language | English |
---|---|
Title of host publication | 2019 IEEE International Conference on Communications, ICC 2019 - Proceedings |
Publisher | IEEE |
Number of pages | 7 |
ISBN (Electronic) | 9781538680889 |
DOIs | |
Publication status | Published - 1 May 2019 |
MoE publication type | A4 Conference publication |
Event | IEEE International Conference on Communications - Shanghai, China Duration: 20 May 2019 → 24 May 2019 http://icc2019.ieee-icc.org/ |
Publication series
Name | IEEE International Conference on Communications |
---|---|
Publisher | IEEE |
Volume | 2019-May |
ISSN (Print) | 1550-3607 |
Conference
Conference | IEEE International Conference on Communications |
---|---|
Abbreviated title | IEEE ICC 2019 |
Country/Territory | China |
City | Shanghai |
Period | 20/05/2019 → 24/05/2019 |
Internet address |