面向多媒体通信服务的取证分析

D. Geneiatakis, A. Keromytis
{"title":"面向多媒体通信服务的取证分析","authors":"D. Geneiatakis, A. Keromytis","doi":"10.1109/WAINA.2011.14","DOIUrl":null,"url":null,"abstract":"No matter how robust the employed security mechanisms are malicious users or attackers will always find a way to bypass them. In addition, National Institute of Security and Technology mentions \"In conjunction with appropriate tools & procedures, audit trail can assist in detecting security violation and flaws in applications\". Until now, in Multimedia Communication Services (MCS), such as Voice over IP, audit trails are not utilized in security audits due to (a) the lack of the appropriate analysis tools and (b) privacy restrictions. In this paper we report on the analysis of MCS audit trail by employing a novel method for identifying \"uncommon\" traffic indicating non normal behaviour that does not violate users’ privacy. We rely on entropy theory and the notion of \"itself information\" to quantify the randomness of specific message segments, and we also introduce the term \"actual itself information\" for the assessment of entire message randomness. To protect users’ privacy we hash audit trail’s data. For evaluating the applicability of our proposed method we utilize an audit trail of a real MCS provider published by honey pot project. Initial outcomes show the feasibility of employing such a method to recognize \"uncommon\" traffic, recorded in MCS audit trail.","PeriodicalId":355789,"journal":{"name":"2011 IEEE Workshops of International Conference on Advanced Information Networking and Applications","volume":"50 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2011-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"3","resultStr":"{\"title\":\"Towards a Forensic Analysis for Multimedia Communication Services\",\"authors\":\"D. Geneiatakis, A. Keromytis\",\"doi\":\"10.1109/WAINA.2011.14\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"No matter how robust the employed security mechanisms are malicious users or attackers will always find a way to bypass them. In addition, National Institute of Security and Technology mentions \\\"In conjunction with appropriate tools & procedures, audit trail can assist in detecting security violation and flaws in applications\\\". Until now, in Multimedia Communication Services (MCS), such as Voice over IP, audit trails are not utilized in security audits due to (a) the lack of the appropriate analysis tools and (b) privacy restrictions. In this paper we report on the analysis of MCS audit trail by employing a novel method for identifying \\\"uncommon\\\" traffic indicating non normal behaviour that does not violate users’ privacy. We rely on entropy theory and the notion of \\\"itself information\\\" to quantify the randomness of specific message segments, and we also introduce the term \\\"actual itself information\\\" for the assessment of entire message randomness. To protect users’ privacy we hash audit trail’s data. For evaluating the applicability of our proposed method we utilize an audit trail of a real MCS provider published by honey pot project. Initial outcomes show the feasibility of employing such a method to recognize \\\"uncommon\\\" traffic, recorded in MCS audit trail.\",\"PeriodicalId\":355789,\"journal\":{\"name\":\"2011 IEEE Workshops of International Conference on Advanced Information Networking and Applications\",\"volume\":\"50 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2011-03-22\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"3\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2011 IEEE Workshops of International Conference on Advanced Information Networking and Applications\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/WAINA.2011.14\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2011 IEEE Workshops of International Conference on Advanced Information Networking and Applications","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/WAINA.2011.14","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 3

摘要

无论所采用的安全机制多么健壮,恶意用户或攻击者总能找到绕过它们的方法。此外,国家安全与技术研究所提到“结合适当的工具和程序,审计跟踪可以帮助检测应用程序中的安全违规和缺陷”。到目前为止,在多媒体通信服务(MCS)中,如IP语音,由于(a)缺乏适当的分析工具和(b)隐私限制,审计跟踪没有用于安全审计。在本文中,我们报告了对MCS审计跟踪的分析,采用了一种新的方法来识别表明不侵犯用户隐私的非正常行为的“不寻常”流量。我们依靠熵理论和“自身信息”的概念来量化特定消息段的随机性,并引入术语“实际自身信息”来评估整个消息的随机性。为了保护用户的隐私,我们对审计跟踪数据进行哈希处理。为了评估我们提出的方法的适用性,我们使用了一个由蜜罐项目发布的真实MCS提供商的审计跟踪。初步结果表明,采用这种方法识别记录在MCS审计跟踪中的“不常见”流量是可行的。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
Towards a Forensic Analysis for Multimedia Communication Services
No matter how robust the employed security mechanisms are malicious users or attackers will always find a way to bypass them. In addition, National Institute of Security and Technology mentions "In conjunction with appropriate tools & procedures, audit trail can assist in detecting security violation and flaws in applications". Until now, in Multimedia Communication Services (MCS), such as Voice over IP, audit trails are not utilized in security audits due to (a) the lack of the appropriate analysis tools and (b) privacy restrictions. In this paper we report on the analysis of MCS audit trail by employing a novel method for identifying "uncommon" traffic indicating non normal behaviour that does not violate users’ privacy. We rely on entropy theory and the notion of "itself information" to quantify the randomness of specific message segments, and we also introduce the term "actual itself information" for the assessment of entire message randomness. To protect users’ privacy we hash audit trail’s data. For evaluating the applicability of our proposed method we utilize an audit trail of a real MCS provider published by honey pot project. Initial outcomes show the feasibility of employing such a method to recognize "uncommon" traffic, recorded in MCS audit trail.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
Evaluation of a Distributed Detecting Method for SYN Flood Attacks Using a Real Internet Trace Network Failure Recovery with Tie-Sets Evaluation of Concurrent Multipath Transfer over Dissimilar Paths A Three-Dimension Analysis of Driving Factors for Mobile Application Stores: Implications of Open Mobile Business Engineering A Novel Bandwidth Estimation Scheme Used in Admission Control for Wireless Mesh Networks
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1