Vis enkel innførsel

dc.contributor.advisorMjølsnes, Stig Frodenb_NO
dc.contributor.advisorWillassen, Sveinnb_NO
dc.contributor.advisorTarkoma, Sasunb_NO
dc.contributor.authorSingh, Gurvindernb_NO
dc.date.accessioned2014-12-19T14:12:33Z
dc.date.available2014-12-19T14:12:33Z
dc.date.created2010-09-03nb_NO
dc.date.issued2009nb_NO
dc.identifier347839nb_NO
dc.identifierntnudaim:4667nb_NO
dc.identifier.urihttp://hdl.handle.net/11250/261830
dc.description.abstractToday people from all lifestyles, government officials, researchers and executives use internet. The people start to depend on internet for their daily life. However, the increased dependence comes with a great risk. The popularity and potential of internet attracts users with illegal intentions as well. The attackers generally establish a connection chain by logging in to a number of intermediary hosts before launching an attack at the victim host. These intermediary hosts are called as stepping-stones. On the victim side, it becomes hard to detect that the peer communicating with the victim is whether a real originator of the connection or it is merely acting as an intermediary host in the connection chain. This master dissertation proposed an approach based on Interarrival packet time to distinguish an incoming connection from a connection coming via some intermediary hosts. The proposed approach uses information available at the receiving end and applicable to encrypted traffic too. The approach was successfully tested for SSH, Telnet, FTP, HTTP and SMTP protocols and implemented in to an intrusion detection system for corresponding protocols. The main applications for the proposed approach are Manual intrusion detection, Tor usage detection and Spam messages detection. The approach is also applicable for the digital forensics investigations. Keywords : Network security, Stepping stone detection, Manual intrusion detection, Tor usage detection, Spam detection and Digital forensics investigation.nb_NO
dc.languageengnb_NO
dc.publisherInstitutt for telematikknb_NO
dc.subjectntnudaimno_NO
dc.subjectMSSECMOB Master in Security and Mobile Computingno_NO
dc.subjectInformation securityno_NO
dc.titleDetection of intermediary hosts through TCP latency propagationnb_NO
dc.typeMaster thesisnb_NO
dc.source.pagenumber107nb_NO
dc.contributor.departmentNorges teknisk-naturvitenskapelige universitet, Fakultet for informasjonsteknologi, matematikk og elektroteknikk, Institutt for telematikknb_NO


Tilhørende fil(er)

Thumbnail
Thumbnail
Thumbnail

Denne innførselen finnes i følgende samling(er)

Vis enkel innførsel