Live Traffic Analysis of TCP/IP Gateways

نویسندگان

  • Phillip A. Porras
  • Alfonso Valdes
چکیده

We enumerate a variety of ways to extend both stat i st i cal and si gnature-based i ntrusi on-detect i on anal ysi s techni ques to moni tor network tra c. Speci cal l y, we present techni ques to anal yze TCP/IP packet streams that ow through network gateways f or si gns of mal i ci ous act i vi ty, nonmal i ci ous f ai l ures, and other except i onal events. The i ntent i s to demonstrate, by exampl e, the ut i l i ty of i ntroduci ng gateway survei l l ance mechani sms to moni tor network tra c. We present thi s di scussi on of gateway survei l l ance mechani sms as compl ementary to the l teri ng mechani sms of a l arge enterpri se network, and i l l ustrate the usef ul ness of survei l l ance i n di rect l y enhanci ng the securi ty and stabi l i ty of network

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Anonymous Internet Communication Based on IPSec

Network approaches for anonymous communication have been extant for some time. Unfortunately, there are limitations with these approaches. In this paper, we first expose the limitations of existing anonymous communication networks. We then present an anonymous Internet communication technique based on IPSec. Our technique provides bi-directional, real-time anonymous Internet communication that ...

متن کامل

RFC 896 Congestion Control in IP / TCP

Congestion control is a recognized problem in complex networks. We have discovered that the Department of Defense’s Internet Protocol (IP) , a pure datagram protocol, and Transmission Control Protocol (TCP), a transport layer protocol, when used together, are subject to unusual congestion problems caused by interactions between the transport and datagram layers. In particular, IP gateways are v...

متن کامل

Packet Loss of Congestion Control Using Early Random in Network

Congestion control of a variable bit-rate data stream crossing the Internet is crucial to ensuring the quality of the received data. This paper discusses the use of link-sharing mechanisms in packet networks and presents algorithms for hierarchical link-sharing. Hierarchical linksharing allows multiple agencies, protocol families, or traffic types to share the bandwidth on a link in a controlle...

متن کامل

The TCP Split Handshake: Practical Effects on Modern Network Equipment

Many network engineers might presume that the TCP three way handshake is the one, inviolate method of establishing TCP connections. A smaller percentage of engineers are also familiar with the little-used "simultaneous-open" connection method of establishing TCP connections. Researchers have discovered a third means to initiate TCP sessions, dubbed the "split-handshake" method, which blends fea...

متن کامل

On Teaching TCP/IP Protocol Analysis to Computer Forensics Examiners

Digital investigators have an increasing need to examine data network logs and traffic, either as part of criminal or civil investigations or when responding to information security incidents. To truly understand the contents of the logs and the data packets, examiners need to have a good foundation in the protocols comprising the Transmission Control Protocol/Internet Protocol (TCP/IP) suite. ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 1998