2011
DOI: 10.1007/978-3-642-18178-8_19
|View full text |Cite
|
Sign up to set email alerts
|

Summary-Invisible Networking: Techniques and Defenses

Abstract: Abstract-Numerous network anomaly detection techniques utilize traffic summaries (e.g., NetFlow records) to detect and diagnose attacks. In this paper we investigate the limits of such approaches, by introducing a technique by which compromised hosts can communicate without altering the behavior of the network as evidenced in summary records of many common types. Our technique builds on two key observations. First, network anomaly detection based on payload-oblivious traffic summaries admits a new type of cove… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...

Citation Types

0
0
0

Publication Types

Select...

Relationship

0
0

Authors

Journals

citations
Cited by 0 publications
references
References 37 publications
(47 reference statements)
0
0
0
Order By: Relevance

No citations

Set email alert for when this publication receives citations?