网络安全外文翻译APR欺骗检测一种主动技术手段.docx

上传人:b****6 文档编号:15774740 上传时间:2023-07-07 格式:DOCX 页数:17 大小:49.73KB
下载 相关 举报
网络安全外文翻译APR欺骗检测一种主动技术手段.docx_第1页
第1页 / 共17页
网络安全外文翻译APR欺骗检测一种主动技术手段.docx_第2页
第2页 / 共17页
网络安全外文翻译APR欺骗检测一种主动技术手段.docx_第3页
第3页 / 共17页
网络安全外文翻译APR欺骗检测一种主动技术手段.docx_第4页
第4页 / 共17页
网络安全外文翻译APR欺骗检测一种主动技术手段.docx_第5页
第5页 / 共17页
网络安全外文翻译APR欺骗检测一种主动技术手段.docx_第6页
第6页 / 共17页
网络安全外文翻译APR欺骗检测一种主动技术手段.docx_第7页
第7页 / 共17页
网络安全外文翻译APR欺骗检测一种主动技术手段.docx_第8页
第8页 / 共17页
网络安全外文翻译APR欺骗检测一种主动技术手段.docx_第9页
第9页 / 共17页
网络安全外文翻译APR欺骗检测一种主动技术手段.docx_第10页
第10页 / 共17页
网络安全外文翻译APR欺骗检测一种主动技术手段.docx_第11页
第11页 / 共17页
网络安全外文翻译APR欺骗检测一种主动技术手段.docx_第12页
第12页 / 共17页
网络安全外文翻译APR欺骗检测一种主动技术手段.docx_第13页
第13页 / 共17页
网络安全外文翻译APR欺骗检测一种主动技术手段.docx_第14页
第14页 / 共17页
网络安全外文翻译APR欺骗检测一种主动技术手段.docx_第15页
第15页 / 共17页
网络安全外文翻译APR欺骗检测一种主动技术手段.docx_第16页
第16页 / 共17页
网络安全外文翻译APR欺骗检测一种主动技术手段.docx_第17页
第17页 / 共17页
亲,该文档总共17页,全部预览完了,如果喜欢就下载吧!
下载资源
资源描述

网络安全外文翻译APR欺骗检测一种主动技术手段.docx

《网络安全外文翻译APR欺骗检测一种主动技术手段.docx》由会员分享,可在线阅读,更多相关《网络安全外文翻译APR欺骗检测一种主动技术手段.docx(17页珍藏版)》请在冰点文库上搜索。

网络安全外文翻译APR欺骗检测一种主动技术手段.docx

网络安全外文翻译APR欺骗检测一种主动技术手段

 

外文翻译原文及译文

 

学院

计算机学院

专业

计算机科学与技术

班级

学号

姓名

指导教师

负责教师

 

2011年6月

DetectingARPSpoofing:

AnActiveTechnique

 

VivekRamachandranandSukumarNandi

CiscoSystems,Inc.,BangaloreIndia

IndianInstituteofTechnology,Guwahati,Assam,India

 

Abstract.TheAddressResolutionProtocol(ARP)duetoitsstatelessnessandlackofanauthenticationmechanismforverifyingtheidentityofthesenderhasalonghistoryofbeingpronetospoofingattacks.ARPspoofingissometimesthestartingpointformoresophisticatedLANattackslikedenialofservice,maninthemiddleandsessionhijacking.Thecurrentmethodsofdetectionuseapassiveapproach,monitoringtheARPtrafficandlookingforinconsistenciesintheEthernettoIPaddressmapping.Themaindrawbackofthepassiveapproachisthetimelagbetweenlearninganddetectingspoofing.Thissometimesleadstotheattackbeingdiscoveredlongafterithasbeenorchestrated.Inthispaper,wepresentanactivetechniquetodetectARPspoofing.WeinjectARPrequestandTCPSYNpacketsintothenetworktoprobeforinconsistencies.Thistechniqueisfaster,intelligent,scalableandmorereliableindetectingattacksthanthepassivemethods.ItcanalsoadditionallydetecttherealmappingofMACtoIPaddressestoafairdegreeofaccuracyintheeventofanactualattack.

 

1.Introduction

TheARPprotocolisoneofthemostbasicbutessentialprotocolsforLANcommunication.TheARPprotocolisusedtoresolvetheMACaddressofahostgivenitsIPaddress.ThisisdonebysendinganARPrequestpacket(broadcasted)onthenetwork.TheconcernedhostnowrepliesbackwithitsMACaddressinanARPreplypacket(unicast).InsomesituationsahostmightbroadcastitsownMACaddressinaspecialGratuitousARPpacket.AllhostsmaintainanARPcachewherealladdressmappingslearntfromthenetwork(dynamicentries)orconfiguredbytheadministrator(staticentries)arekept.Thedynamicentriesageoutafterafixedintervaloftime,whichvariesacrossoperatingsystems.Aftertheentryagesoutitisdeletedfromthecacheandifthehostwantstocommunicatewiththesamepeer,anotherARPrequestismade.Thestaticentriesneverageout.

TheARPprotocolisstateless.HostswillcacheallARPrepliessenttothemeveniftheyhadnotsentanexplicitARPrequestforit.EvenifapreviousunexpireddynamicARPentryisthereintheARPcacheitwillbeoverwrittenbyanewerARPreplypacketonmostoperatingsystems.AllhostsblindlycachetheARPrepliestheyreceive,astheyhavenomechanismtoauthenticatetheirpeer.Thisistherootproblem,whichleadstoARPspoofing.

ARPspoofingistheprocessofforgingARPpacketstobeabletoimpersonateanotherhostonthenetwork.InthemostgeneralformofARPspoofingtheattackersendsspoofedARPresponsestothevictimperiodically.TheperiodbetweenthespoofedresponsesismuchlesserthantheARPcacheentrytimeoutperiodfortheoperatingsystemrunningonthevictimhost.ThiswillensurethatthevictimhostwouldnevermakeanARPrequestforthehostwhoseaddresstheattackerisimpersonating.Followingsubsectionbrieflydiscussthecurrentdetectionandmitigationtechniques.

1.1CurrentMitigationandDetectionTechniques

ExistingARPspoofingdetectiontechniquesarediscussednextsequentially.

1.1.1SecureARPProtocol(S-ARP)

ThishasbeenproposedasareplacementfortheARPprotocolinS-ARP:

aSecureAddressResolutionProtocol.TheS-ARPprotocolisdefinitelyapermanentsolutiontoARPspoofingbutthebiggestdrawbackisthatwewillhavetomakechangestothenetworkstackofallthehosts.Thisisnotveryscalableasgoingforastackupgradeacrossallavailableoperatingsystemsissomethingbothvendorsandcustomerswillnotbehappyabout.AsS-ARPusesDigitalSignatureAlgorithm(DSA)wehavetheadditionaloverheadofcryptographiccalculationsthoughtheauthorsofthepaperhaveclaimedthatthisoverheadisnotsignificant.

1.1.2StaticMACEntries

AddingstaticMACaddressesoneveryhostforallotherhostswillnotallowspoofingbutisnotascalablesolutionatallandmanagingalltheseentriesisafulltimejobbyitself.Thiscanfailmiserablyifmobilehostssuchaslaptopsareperiodicallyintroducedintothenetwork.AlsosomeoperatingsystemsareknowntooverwritestaticARPentriesiftheyreceiveGratuitousARPpackets(GARP).

1.1.3KernelBasedPatches

KernelbasedpatchessuchasAnticapandAntidotehavemadeanattempttoprotectfromARPspoofingataindividualhostlevel.AnticapdoesnotallowupdatingofthehostARPcachebyanARPreplythatcarriesadifferentMACaddressthentheonealreadyinthecache.ThisunfortunatelymakesitdroplegalgratuitousARPrepliesaswell,whichisaviolationtotheARPprotocolspecification.AntidoteonreceivinganARPreplywhoseMACaddressdiffersfromthepreviouslycachedonetriestocheckifthepreviouslylearntMACisstillalive.IfthepreviouslylearntMACisstillalivethentheupdateisrejectedandtheoffendingMACaddressisaddedtoalistofbannedaddresses.

BoththeabovetechniquesrelyonthefactthattheARPentryinthecacheisthelegitimateone.Thiscreatesaracesituationbetweentheattackerandthevictim.IftheattackergetshisspoofedARPentryintothehost’scachebeforetherealhostcan,thentherealMACaddressisbanned.Thiscanonlybeundonebyadministrativeintervention.ThuswecanconcludethatwronglearningmaycausethesetoolstofailindetectingARPspoofing.

1.1.4PassiveDetection

InPassiveDetectionwesnifftheARPrequests/responsesonthenetworkandconstructaMACaddresstoIPaddressmappingdatabase.IfwenoticeachangeinanyofthesemappingsinfutureARPtrafficthenweraiseanalarmandconcludethatanARPspoofingattackisunderway.ThemostpopulartoolinthiscategoryisARPWATCH.

Themaindrawbackofthepassivemethodisatimelagbetweenlearningtheaddressmappingsandsubsequentattackdetection.InasituationwheretheARPspoofingbeganbeforethedetectiontoolwasstartedforthefirsttime,thetoolwilllearntheforgedrepliesinit’sIPtoMACaddressmappingdatabase.Nowonlyafterthevictimstartscommunicatingwithsomeotherhosttheinconsistencywillbedetectedandanalarmrose.Theattackermayhavemadehisgetawaybecauseofthisdelay.Alsoaspoofedentrylearnedasintheabovescenariowouldhavetobemanuallyundonebythenetworkadministrator.Theonlysolutiontothisproblemistomanuallyfeedthecorrectaddressmappingsintothedatabasebeforestartingthetoolorcreateanattackfreelearningtraffic.Bothoftheseareunreasonableduetoscalabilityandmobilityissues.Anidealexamplewouldbemobilehostse.g.laptopsbroughtinbycustomersorvisitorstoacompany.Thisslowlearningcurvemakesitimpossibletoinstallpassivetoolsonalargenetwork(1000+hosts)andexpectthemtoidentifyattacksinstantaneously.

ThepassivetechniquesdonothaveanyintelligenceandblindlylookforamismatchintheARPtrafficwiththeirlearntdatabasetables.IfanARPspoofingisdetectedthanthereisnowayofascertainingifthenewlyseenaddressmappingisbecauseofaspoofingattemptorthepreviouslylearntonewasactuallyaspoofedone.OurtechniquewilldeterminetherealMACtoIPmappingduringanactualattacktoafairdegreeofaccuracy.

Thepassivelearningtechniqueisalsoveryunreliable.AnewaddressmappingislearntwhenARPtrafficisseenfromthem.ThusaswitchARPCachetableoverflowattemptbythegenerationofrandomARPreplypacketspersecondwitharbitraryMACandIPaddresseswilljustresultinnewstationsbeingdiscoveredinsteadofbeingreportedasattacktraffic.Toovercomeproblemsinearliertechniques,wepresentanewARPspoofingdetectiontechnique.OurtechniqueusesanactiveapproachtodetectARPspoofing.WesendoutARPrequestandTCPSYNpacketstoprobetheauthenticityoftheARPtrafficweseeinthenetwork.Theapproachisfaster,intelligent,scalableandmorereliableindetectingattacksthanthepassivemethods.ItcanalsoadditionallydetecttherealmappingofMACtoIPaddressestoafairdegreeofaccuracyintheeventofanactualattack.Adescriptionofthetechniqueindetailisreportedinfollowingsections.

2TheProposedActiveDetectionTechniqueforARPspoofing

TheproposedtechniqueactivelyinteractswiththenetworktogaugethepresenceofARPspoofingattacks.Wewillhenceforthassumethefollowingaboutthenetworkwedesiretoprotect.

2.1Assumptions

1.Theattacker’scomputerhasanormalnetworkstack.Thisassumptionwillholdformostoftheattacksas“readytouse”ARPspoofingtoolshavealwaysbeentheattacker’smostpopularchoice.IftheattackerdoesuseacustomizedstackthenourtechniquewillstilldetectARPspoofingbutwillnotbeabletopredictthecorrectaddressmappingsanymore.Wewilldiscussperformanceinthepresenceofacustomizedstackinsection2.5.

2.TheindividualhostswedesiretoprotectonthenetworkmayuseapersonalfirewallbutatleastoneTCPportshouldbeallowedthroughthefirewall.Thisistoallowourprobepackets(TCPSYNpackets)togothrough.ThisisareasonableassumptionasevenifafirewallisinstalledsomeLANbasedservicessuchasNETBIOSetcarenormallyallowedthroughitforLANcommunication.

3.Weassumethatalldevices,whichweprotect,haveaTCP/IPnetworkstackupandrunning.

2.2Terminology

Wenowintroducetheterminologyusedintherestofthispaper.

1.Thresholdinterval:

ARPrepliestoanARPrequestmustbereceivedwithinaspecifiedtimeinterval.Afterthistimehaselapse

展开阅读全文
相关资源
猜你喜欢
相关搜索
资源标签

当前位置:首页 > 幼儿教育 > 幼儿读物

copyright@ 2008-2023 冰点文库 网站版权所有

经营许可证编号:鄂ICP备19020893号-2