Efficient detection of delay-constrained relay nodes

Baris Coskun, Nasir Memon

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

Relay nodes are a potential threat to networks since they are used in many malicious situations like stepping stone attacks, botnet communication, peer-to-peer streaming etc. Quick and accurate detection of relay nodes in a network can significantly improve security policy enforcement. There has been significant work done and novel solutions proposed for the problem of identifying relay flows active within a node in the network. However, these solutions require quadratic number of comparisons in the number of flows. In this paper, a related problem of identifying relay nodes is investigated where a relay node is defined as a node in the network that has an active relay flow. The problem is formulated as a variance estimation problem and a statistical approach is proposed for the solution. The proposed solution requires linear time and space in the number of flows and therefore can be employed in large scale implementations. It can be used on its own to identify relay nodes or as a first step in a scalable relay flow detection solution that performs known quadratic time analysis techniques for relay flow detection only on nodes that have been detected as relay nodes. Experimental results show that the proposed scheme is able to detect relay nodes even in the presence of intentional inter-packet delays and chaff packets introduced by adversaries in order to defeat timing based detection algorithms.

Original languageEnglish (US)
Title of host publicationProceedings - 23rd Annual Computer Security Applications Conference, ACSAC 2007
Pages353-362
Number of pages10
DOIs
StatePublished - 2007
Event23rd Annual Computer Security Applications Conference, ACSAC 2007 - Miami Beach, FL, United States
Duration: Dec 10 2007Dec 14 2007

Publication series

NameProceedings - Annual Computer Security Applications Conference, ACSAC
ISSN (Print)1063-9527

Other

Other23rd Annual Computer Security Applications Conference, ACSAC 2007
Country/TerritoryUnited States
CityMiami Beach, FL
Period12/10/0712/14/07

ASJC Scopus subject areas

  • Software
  • General Engineering

Fingerprint

Dive into the research topics of 'Efficient detection of delay-constrained relay nodes'. Together they form a unique fingerprint.

Cite this