[go: up one dir, main page]

Shanmugasundaram et al., 2004 - Google Patents

Payload attribution via hierarchical bloom filters

Shanmugasundaram et al., 2004

View PDF
Document ID
17441446433125131889
Author
Shanmugasundaram K
Brönnimann H
Memon N
Publication year
Publication venue
Proceedings of the 11th ACM conference on Computer and communications security

External Links

Snippet

Payload attribution is an important problem often encountered in network forensics. Given an excerpt of a payload, finding its source and destination is useful for many security applications such as identifying sources and victims of a worm or virus. Although IP …
Continue reading at www.engineering.iastate.edu (PDF) (other versions)

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1425Traffic logging, e.g. anomaly detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/02Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
    • H04L63/0209Architectural arrangements, e.g. perimeter networks or demilitarized zones
    • H04L63/0218Distributed architectures, e.g. distributed firewalls
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/02Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
    • H04L63/0227Filtering policies
    • H04L63/0263Rule management
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/02Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
    • H04L63/0227Filtering policies
    • H04L63/0245Filtering by information in the payload

Similar Documents

Publication Publication Date Title
Shanmugasundaram et al. Payload attribution via hierarchical bloom filters
US7933208B2 (en) Facilitating storage and querying of payload attribution information
Whyte et al. DNS-based Detection of Scanning Worms in an Enterprise Network.
Goodrich Efficient packet marking for large-scale IP traceback
Belenky et al. On deterministic packet marking
Mirkovic et al. A taxonomy of DDoS attack and DDoS defense mechanisms
Mirkovic D-WARD: source-end defense against distributed denial-of-service attacks
US8296842B2 (en) Detecting public network attacks using signatures and fast content analysis
US7620733B1 (en) DNS anti-spoofing using UDP
US20110047610A1 (en) Modular Framework for Virtualization of Identity and Authentication Processing for Multi-Factor Authentication
Patil et al. Unmasking of source identity, a step beyond in cyber forensic
Ponec et al. New payload attribution methods for network forensic investigations
Santhanam et al. Taxonomy of IP traceback
Hamadeh et al. A taxonomy of internet traceback
JP4743901B2 (en) Method, system and computer program for detecting unauthorized scanning on a network
Pilli et al. Data reduction by identification and correlation of TCP/IP attack attributes for network forensics
Chen et al. Detecting Internet worms at early stage
Hamadeh et al. Performance of ip address fragmentation strategies for ddos traceback
Tzur-David et al. Delay fast packets (dfp): Prevention of dns cache poisoning
Mopari et al. Detection of DDoS attack and defense against IP spoofing
Xie et al. An authentication based source address spoofing prevention method deployed in IPv6 edge network
Mishra Polys: Network-based signature generation for zero-day polymorphic worms
Parashar et al. Improved deterministic packet marking algorithm
Leu et al. IFTS: Intrusion forecast and traceback based on union defense environment
Nagaonkar et al. Detecting stealthy scans and scanning patterns using threshold random walk