Technical Track
In this paper, we present a method to detect the existence of sophisticated
attack tools in the Internet that combine, in a misleading way, several
exploits. These tools apply various attack strategies, resulting into several
different attack fingerprints. A few of these sophisticated tools have already
been identified, e.g. Welchia. However, devising a method to automatically
detect them is very challenging since their different fingerprints are
apparently unrelated. We propose a technique to automatically detect their
existence through their time signatures. We exemplify the interest of the
technique on a large set of real world attack traces and discover a handful of
those new sophisticated tools.
http://www.first.org/conference/2006/papers/pouget-fabien-slides.pdf
Type: Slides
Format: application/pdf
Last updated: July 12, 2006
Size: 1.84 Mb
http://www.first.org/conference/2006/papers/pouget-fabien-papers.pdf
Type: Paper
Format: application/pdf
Last updated: July 12, 2006
Size: 384 Kb
Authors & presenters
Fabien Pouget (CERTA French Government, FR) Guillaume Urvoy-Keller (Institut EURECOM, FR) Marc Dacier (Institut EURECOM, FR)