Active Watermark-Based Correlation Scheme for Identifying Source of Attack in Presence of Timing Perturbations

نویسندگان

  • M. Deepika
  • G. Om Sai Prashant
چکیده

Intruders have changed their mode of operandi in breaking security of IT systems. Of late they are using different strategies making attacks successfully. One of their strategies is to attack systems though some intermediary nodes in the network instead of making attacks from their own machine. This helps them in hiding their identity. Such attacks can be identified by verifying and correlating incoming and outgoing network flows that come through intermediary nodes used in routing the attacks. The problem with this approach lies in the fact that attackers may intentionally alter such flow by disguising it and fooling the detection systems. The existing timing based correlation approaches to solve this problem are inadequate when attackers intentionally introduce timing perturbations. This paper introduces a new correlation approach based on watermarking which is proved to be robust to address such problems. This is achieved by timing of some packets selectively and embedding watermark in to the encrypted flows. This approach is active and can resist timing perturbations done by attackers. The empirical results reveal that our approach is almost close to providing 100% true positives. Index Terms – Network intrusion detection, timing correlation, network flows, intermediary nodes, and timing perturbations. INTRODUCTION The information systems in the real world have been victims of network based attacks. This is the cause of concern though there are many security mechanisms in place to prevent such attacks. As security mechanisms grow in robustness in addressing many possible attacks, the attackers are also changing their strategies in making attacks successfully. This has become every growing problem that needs continuous attention and need to have on going research efforts. When attack is made, it is very essential to have the ability to trace and identify the source of attack. When attackers conceal their identity by not making attacks from their machine directly, it is challenging to find the source of attack. Obviously attackers over network are using some intermediary nodes to execute their attacks. The intermediary nodes, as they believe, hide the identity of original attacker. This makes it difficult to identify the source of attack as the attack is made through intermediary nodes by even spoofing IP source address of attack traffic. IP traceback is the method to identify source of attack in such cases as described in [1] and [2]. As discussed earlier, the attackers take countermeasures to IP traceback by making network – based intrusions through intermediary nodes. This is achieved by attacker by using some remote login programs like SSH or Telnet and perform attacks from remote machines in the network. The IP traceback method being employed in the industry is not adequate to reach the actual source of attack as the intermediary nodes stand in between. From the literature it is understood that the prior works in this area were based on the login activities of the tracking user at various hosts [3], [4]. This has limitations as it fails to reach the actual source of attack when there are manipulations in the middle. Later researchers focused on the process of comparing payloads or packets of all the connections that are to be correlated [5], [6]. These are effective but suffer from limitations such as inability to accurately finding the source of attack. To overcome these limitations, some researchers [7], [8], [9] have focused on the features or characteristics of connections for the purpose of comparing and correlating encrypted connections. Timing based correlations suffer from the drawback that the adversaries may be able to perturb the timing based correlations intentionally. Addressing this problem is challenging as the encrypted traffics are subjected to time based perturbations. To overcome the drawback of the timing based correlations, this paper introduces an efficient correlation scheme that is provide to be robust to such attacks. The proposed scheme is watermark – based which is active in nature. This means that it dynamically embeds watermark into encrypted flows. This is performed by slightly adjusting the timing of selected packets. Out approach also needs significantly less number of packets to achieve this. This is in contrast to the existing passive timing correlation schemes. The experimental results reveal the fact that our approach is close to 100% true positives. M. Deepika, G. Om Sai Prashant / International Journal of Engineering Research and Applications (IJERA) ISSN: 2248-9622 www.ijera.com Vol. 2, Issue 6, NovemberDecember 2012, pp.925-930 926 | P a g e RELATED WORK When attacks are made through intermediary nodes by intruders it is very challenging to establish the source of attack accurately. This section provides insights into the literature in which many existing works on similar lines are reviewed. The existing solutions pertaining to connection correlation such as CIS [3], SWT [6], Thumbprinting [5], and DIDS [4] were developed based on certain features or characteristics. They include inter-packet timing characteristics, host activity and connection content such as packet payload. The main drawback of these solutions is that the host activity related data collected from intermediary node which is intended to find the source of attack is not trustworthy. This is because the attack is expected to have full control over all intermediary nodesand his node it is possible for attacker to manipulate the traffic to conceal him from being traced. As the attacker has logged into remote intermediary machines through remote login programs such as SSH and Telnet he has gained access to the resources of the intermediary nodes. The drawback of content based correlation approaches is that they assume that the payload of packets is not changed across the intermediary nodes. As encryption of such content can be made by attacker, these approaches are suitable only for unencrypted connections. Other approaches such as timing based approaches passively monitor incoming and outgoing traffic and correlate the flows. The main drawback of these approaches is that the attacker can perform timing based perturbations to deceive the detection systems. Therefore these systems tend to fail in this case. The first generation of correlation approaches that are timing – based were very effective. They were able to correlate encrypted connections and establish the actual source of attack successfully and accurately. However, in the later stages, the intruders changed the way they make attacks. They started using encrypted connections and also perform timing perturbations. Thus these first generation correlation approaches became ineffective hence they are vulnerable when attackers use active timing perturbations. In [8] Donoho et al. first of all identified the limits of the attackers on performing active timing perturbations and injection of bogus packets. They showed that correlation based long time behavior is possible in spite of timing perturbations from attackers. According to them this can be achieved by using multiple timescale analysis techniques. However, in [8] they could not provide information on tradeoffs between the scale of timing perturbation and the required level of correlation effectiveness and the packets needed. Other issue that could not be addressed by [8] is the jitter used by intruders. Due to the drawbacks in first generation timing based correlation techniques, the coarse scale analysis causes false positives to be increased. However, the true positives are increased with timing – perturbed flows usage. The limitations of timing perturbations is studied in [8]. However, they did not address these problems in their paper. In [10] and [7] other positive timing based correlation methods came into existing and they consider false positives and true positives at a time. They tend to derive both lower and upper bounds on the number of packets required to achieve false positive rate and 100% rate of true positives. The work of those papers could not provide any experimental evidences. He et al. [11] and Zhang et al. [12] of late proposed many timing based correlation methods based on the assumptions used in [7] and their approach has been proved to be better. However, they are using passive timing based approach. Information theoretic game is explored in [13]. Their analysis is based on the packet reordering channels. Watermark based correlation is studied in [10] recently and provided a statistical method in order to detect the presence of watermark in packet flow. Their method has some assumptions such as having access to flows containing watermark and no watermark. Overall, the existing approaches are passive in measuring the possibility of timing perturbations done by intruders. The existing approaches fail to cope with when intruders use timing perturbations in encrypted connections. To overcome this problem, this paper proposed an active timing based correlation approach without any assumptions, without any usage of random process , robust and requires very less packets when compared to passive approaches for ensuring the same level of accuracy in finding the source of attack and showing close to 100% true positives. OVERVIEW OF OUR APPROCH The proposed watermarking-based correlation approach is aware of bidirectional communication nature of remote login programs such as SSH or Telnet. This is because when attacks are made by adversaries trough intermediary nodes and by making use of remote login programs, it is essential to trace it back from the victim node to the attacker’s actual machine. Figure 1 shows outline of the proposed model. As can be seen in the figure, between attacker and intended victim or target machines, there lay a set of intermediary nodes named H1, H2, and H3. These are considered for illustrative purpose only. There might be n number of intermediary nodes between the source and destination. The attacker here does not make an attempt to execute attacks directly on the target. Instead, by using remote login programs such as Telnet, SSH, etc. he will execute the attacks through intermediary programs and machines. This makes the security personnel at target machine to establish the source of attack accurately. M. Deepika, G. Om Sai Prashant / International Journal of Engineering Research and Applications (IJERA) ISSN: 2248-9622 www.ijera.com Vol. 2, Issue 6, NovemberDecember 2012, pp.925-930 927 | P a g e Attacker H1 Fig. 1 – Outline of watermark tracing model As can be seen in the proposed model in fig. 1, there are network sensors named S1, S2, and S3. These sensors are responsible to monitor the network flows and also involved in preventing disguised attacks from the adversaries. When attack is made by intruder, before it reaches final target machine, the proposed watermarking – based scheme will watermark the backward traffic and inform the fact to all sensors that are employed in the network. Afterwards, the sensors monitor the traffic and inform the target machines about any occurrence of watermark in the traffic flows. The sensors are deployed at strategic places such as edge router, firewall and gateway that are part of the network. The traffic that comes backward from the attack node back to actual source, the backward traffic which has been watermarked by the target’s security framework, it can’t be controlled by adversary. The attacker has no access to unwatermarked version of traffic. This very reason makes it difficult for the adversary to know the packets that are delayed. To follow any distribution mechanism to be effective the correlation method proposed here does not require the random timing perturbation provided by the attackers. Only one assumption made in this paper pertaining to timing perturbations. PROPOSED WATERMARK BIT EMBEDDING AND DECODING As intruders can perform timing based perturbations to encrypted flows, the watermark embedding is done at target machine. First of all IPD is quantized using the function. q (ipd,s)=round (ipd/s), Then the embedding process is done using the function E(ipd,w,s) = [q (ipd + s/2,s) +∆] X s, In accordance with the above function, the watermark-bit-decoding is done as follows. d(ipdw,s) = d (ipdw,s) mod 2. EXPERIMENTAL RESULT Analysis of Watermark Delectability Watermark detection is a process of checking whether the given watermark is embedded in flows. The proposed watermark detector followed steps described here. Decode l-bit from given flow; compare the decoded l-bit (wf) with w; if the Hamming distance between wf and w indicate the decoded l-bits report that watermark is detected. Fig. 2 – Effect of threshold on detection and collision rates of watermarking method As can be seen in fig. 2, the derived probability distribution is plotted in Y axis while the Hamming distance in X axis for the expected detection and collision rates. 0 5 10 15 20 25 30 1 2 3 4 5 6 7 8 9 10 11 P ro b ab ili ty Hamming Distance Expect ed Detecti on Expect ed Colliso n S1

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Implementation of Network Level Security Process through Stepping Stones by Watermarking Methodology

Network based attacks have become a serious threat to the critical information infrastructure on which we depend .Identifying the source of the attackers behind the stepping stone(s), it is necessary to correlate the incoming and outgoing flows or connections of a stepping stone. To resist attempts at correlation, the attacker may encrypt or otherwise manipulate the connection traffic. Timing b...

متن کامل

Analysis and Improving the Security of the Scalar Costa Scheme against Known Message Attack

Unintentional attacks on watermarking schemes lead to degrade the watermarking channel, while intentional attacks try to access the watermarking channel. Therefore, watermarking schemes should be robust and secure against unintentional and intentional attacks respectively. Usual security attack on watermarking schemes is the Known Message Attack (KMA). Most popular watermarking scheme with stru...

متن کامل

Blind Watermark Estimation Attack for Spread Spectrum Watermarking

This paper presents an efficient scheme for blind watermark estimation embedded using additive watermark embedding methods. The scheme exploits mutual independence between the host media and the embedded watermark and non-Gaussianity of the host media for watermark estimation. The proposed scheme employs the framework of independent component analysis (ICA) and poses the problem of watermark es...

متن کامل

A Robust Digital Image Watermarking Scheme Based on DWT

In this paper a wavelet-based logo watermarking scheme is presented. The logo watermark is embedded into all sub-blocks of the LLn sub-band of the transformed host image, using quantization technique. Extracted logos from all sub-blocks are merged to make the extracted watermark from distorted watermarked image. Knowing the quantization step-size, dimensions of logo and the level of wavelet tra...

متن کامل

Multi block based image watermarking in wavelet domain using genetic programming

The increased utilization of internet in sharing and distribution of digital data makes it is very difficult to maintain copyright and ownership of data. Digital watermarking offers a method for authentication and copyright protection. We propose a blind, still image, Genetic Programming (GP) based robust watermark scheme for copyright protection. In this scheme, pseudorandom sequence of real n...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2012