Empirical and theoretical evaluation of active probing attacks and their countermeasures

  • Authors:
  • Xinwen Fu;Bryan Graham;Dong Xuan;Riccardo Bettati;Wei Zhao

  • Affiliations:
  • Department of Computer Science, Texas A&M University;Department of Computer Science, Texas A&M University;Department of Computer and Information Science, Ohio State University;Department of Computer Science, Texas A&M University;Department of Computer Science, Texas A&M University

  • Venue:
  • IH'04 Proceedings of the 6th international conference on Information Hiding
  • Year:
  • 2004

Quantified Score

Hi-index 0.00

Visualization

Abstract

A variety of remote sensing attacks allow adversaries to break flow confidentiality and gather mission-critical information in distributed systems. Such attacks are easily supplemented by active probing attacks, where additional workload (e.g., ping packets) is injected into the victim system. This paper presents statistical pattern recognition as a fundamental technology to evaluate the effectiveness of active probing attacks. Our theoretical analysis and empirical results show that even if sophisticated approaches of link padding are used, sample entropy of probing packets’ round trip time is an effective and robust feature statistic to discover the user payload traffic rate, which is important for maintaining anonymous communication. Extensive experiments on local network, campus network, and the Internet were carried out to validate the system security predicted by the theoretical analysis. We give some guidelines to reduce the effectiveness of such active probing attacks.