Providing Process Origin Information to Aid in Network Traceback
Download
Author
Florian Buchholz and Clay Shields
Tech report number
CERIAS TR 2002-22
Entry type
techreport
Abstract
It is desirable to hold network attackers accountable for their actions in both criminal investigatoins and information warfare situations. Currently, attackers are able to hide their location effectively by creating a chain of connections through a series of hosts. This method is effective because current host audit systems do not maintain enough information to allow association of incoming and outgoing network connections. In this paper, we introduce an inexpensive method that allows both on-line and forensic matching of incoming and outgoing network traffic. Our methd associates origin information with each process in the system process table, and enhances the audit information by logging the origin and destination of network sockets. We present implementation results and show that our methos can effecively record origin information abou the common cases of stepping stone connections and denial of service zombies, and describe the limitations of our approach.
Download
Date
2002 – July
How published
Proceedings of the 2002 USENIX Annual Technical Conference
Key alpha
Buchholz2002
Affiliation
CERIAS
Publication Date
1900-01-01

