Security

An Invisible Localization Attack to Internet Threat Monitors

Download Now Free registration required

Executive Summary

Internet Threat Monitoring (ITM) systems have been deployed to detect widespread attacks on the Internet in recent years. However, the effectiveness of ITM systems critically depends on the confidentiality of the location of their monitors. If adversaries learn the monitor locations of an ITM system, they can bypass the monitors and focus on the uncovered IP address space without being detected. In this paper, the authors study a new class of attacks, the invisible LOCalization (iLOC) attack. The iLOC attack can accurately and invisibly localize monitors of ITM systems. In the iLOC attack, the attacker launches low rate port-scan traffic, encoded with a selected Pseudo-Noise code (PN-code), to targeted networks.

  • Format: PDF
  • Size: 431.4 KB