RevealNet: Distributed Traffic Correlation for Attack Attribution on Programmable Networks
Main:8 Pages
9 Figures
Bibliography:2 Pages
5 Tables
Abstract
Network attackers have increasingly resorted to proxy chains, VPNs, and anonymity networks to conceal their activities. To tackle this issue, past research has explored the applicability of traffic correlation techniques to perform attack attribution, i.e., to identify an attacker's true network location. However, current traffic correlation approaches rely on well-provisioned and centralized systems that ingest flows from multiple network probes to compute correlation scores. Unfortunately, this makes correlation efforts scale poorly for large high-speed networks.
View on arXivComments on this paper
