Sie befinden Sich nicht im Netzwerk der Universität Paderborn. Der Zugriff auf elektronische Ressourcen ist gegebenenfalls nur via VPN oder Shibboleth (DFN-AAI) möglich. mehr Informationen...
Ergebnis 9 von 480
2012 32nd International Conference on Distributed Computing Systems Workshops, 2012, p.417-426
2012
Volltextzugriff (PDF)

Details

Autor(en) / Beteiligte
Titel
Traceback Attacks in Cloud -- Pebbletrace Botnet
Ist Teil von
  • 2012 32nd International Conference on Distributed Computing Systems Workshops, 2012, p.417-426
Ort / Verlag
IEEE
Erscheinungsjahr
2012
Quelle
IEEE Xplore
Beschreibungen/Notizen
  • Botmaster sets up Command and Control (C&C) server and stepping-stones in the Internet for stealing sensitive information from victim's machine. Clouds provide botmaster with an ideal environment of rich computing resources where he can easily deploy/remove C&C server and establish/tear-down stepping-stones for anonymous attacks. It is of vital importance for cloud service providers to detect botnet, prevent attack, and trace back to the botmaster. We present our Pebble trace scheme for the trace back to the botmaster. It first identifies cryptographic keys of the botnet communications for configuring botnet operations and then traces back to the botmaster. We design and implement a new key identification scheme and propose an approach for tracing back to the botmaster across stepping-stones and beyond multiple clouds without universal deployment of monitors, router updates, or ISP support. We implement our method and build a Pebble-trace prototype that is applied to Zeus botnet in OpSource cloud with promising results.
Sprache
Englisch
Identifikatoren
ISSN: 1545-0678
eISSN: 2332-5666
DOI: 10.1109/ICDCSW.2012.61
Titel-ID: cdi_ieee_primary_6258188

Weiterführende Literatur

Empfehlungen zum selben Thema automatisch vorgeschlagen von bX