Holding intruders accountable on the Internet

  • Authors:
  • S. Staniford-Chen;L. T. Heberlein

  • Affiliations:
  • -;-

  • Venue:
  • SP '95 Proceedings of the 1995 IEEE Symposium on Security and Privacy
  • Year:
  • 1995

Quantified Score

Hi-index 0.02

Visualization

Abstract

Abstract: This paper addresses the problem of tracing intruders who obscure their identity by logging through a chain of multiple machines. After discussing previous approaches to this problem, we introduce thumbprints which are short summaries of the content of a connection. These can be compared to determine whether two connections contain the same text and are therefore likely to be part of the same connection chain. We enumerate the properties a thumbprint needs to have to work in practice, and then define a class of local thumbprints which have the desired properties. A methodology from multivariate statistics called principal component analysis is used to infer the best choice of thumbprinting parameters from data. Currently our thumbprints require 24 bytes per minute per connection. We develop an algorithm to compare these thumbprints which allows for the possibility that data may leak from one time-interval to the next. We present experimental data showing that our scheme works on a local area network.