Watch Your Step! Detecting Stepping Stones in Programmable Networks

Debopam Bhattacherjee, Andrei Gurtov, Tuomas Aura

Tutkimustuotos: Artikkeli kirjassa/konferenssijulkaisussaConference contributionScientificvertaisarvioitu

1 Sitaatiot (Scopus)

Abstrakti

Hackers hide behind compromised intermediate hosts and pose advanced persistent threats (APTs). The compromised hosts are used as stepping stones to launch real attacks, as is evident from an incident that shook the world in 2016 - Panama Papers Leak. The major attack would not go unnoticed if the compromised stepping stone, in this case an email server, could be identified in time. In this paper, we explore how today's programmable networks could be retrofitted with effective stepping stone detection mechanisms to correlate flows. We share initial results to prove that such a setup exists. Lastly, we analyze scalability issues associated with the setup and explore recent developments in network monitoring which have potential to address these issues.

AlkuperäiskieliEnglanti
Otsikko2019 IEEE International Conference on Communications, ICC 2019 - Proceedings
KustantajaIEEE
Sivumäärä7
ISBN (elektroninen)9781538680889
DOI - pysyväislinkit
TilaJulkaistu - 1 toukok. 2019
OKM-julkaisutyyppiA4 Artikkeli konferenssijulkaisuussa
TapahtumaIEEE International Conference on Communications - Shanghai, Kiina
Kesto: 20 toukok. 201924 toukok. 2019

Julkaisusarja

NimiIEEE International Conference on Communications
KustantajaIEEE
Vuosikerta2019-May
ISSN (painettu)1550-3607

Conference

ConferenceIEEE International Conference on Communications
LyhennettäICC
Maa/AlueKiina
KaupunkiShanghai
Ajanjakso20/05/201924/05/2019

Sormenjälki

Sukella tutkimusaiheisiin 'Watch Your Step! Detecting Stepping Stones in Programmable Networks'. Ne muodostavat yhdessä ainutlaatuisen sormenjäljen.

Siteeraa tätä