Security

STRAB: Sensing and Tracing Back Attackers Against Encrypted Protocols

Free registration required

Executive Summary

The uncontrolled growth of the network based applications has contributed to enormous security leaks. Though the encrypted protocols are used to provide secure communication, Intrusion detection systems (Idss) are often employed to monitor network traffic and host activities that may lead to unauthorized accesses and attacks against vulnerable services. Anomaly based IDS, it is a system for detecting computers intrusions and misuse by monitoring system activity and classifying it as either normal or anomalous. To detect and trace back attacks against encrypted protocols, the authors use an anomaly-based intrusion detection system by using deliberately distributed Monitoring stubs (Mss).

  • Format: PDF
  • Size: 118.7 KB