Reconstruction of malicious internet flows

  • Authors:
  • Omer Demir;Bilal Khan;Ala Al-Fuqaha

  • Affiliations:
  • City University of New York (CUNY), New York, NY;City University of New York (CUNY), New York, NY;Western Michigan University, Kalamazoo, MI

  • Venue:
  • Proceedings of the 6th International Wireless Communications and Mobile Computing Conference
  • Year:
  • 2010

Quantified Score

Hi-index 0.00

Visualization

Abstract

We describe a general-purpose distributed system capable of traceback of malicious flow trajectories in the wide area despite possible source IP spoofing. Our system requires the placement of agents on a subset of the inter-autonomous system (AS) links of the Internet. Agents are instrumented with a uniform notion of attack criterion. Deployed, these agents implement a self-organizing, decentralized mechanism that is capable of reconstructing topological and temporal information about malicious flows. For example, when the attack criterion is taken to be based on excessive TCP connection establishment traffic to a destination, the system becomes a traceback service for distributed denial of service (DDoS) attacks. As another special case, when the attack criterion is taken to be based on malicious payload signature match as defined by an intrusion detection system (IDS), the agents provide a service for tracing malware propagation pathways. The main contribution of this paper, is to demonstrate that the proposed system is effective at recovering malicious flow structure even at moderate levels of deployment in large networks, including within the present Internet topology.