DID YOU KNOW? DTIC has over 3.5 million final reports on DoD funded research, development, test, and evaluation activities available to our registered users. Click
HERE to register or log in.
Accession Number:
ADA581858
Title:
Detecting Hidden Communications Protocols
Descriptive Note:
Final rept. 1 Mar 2009-30 Nov 2012
Corporate Author:
CLEMSON UNIV SC
Report Date:
2013-02-11
Pagination or Media Count:
37.0
Abstract:
The work funded by the grant is structured in three parts We analyzed the vulnerability of the current generation anonymity tools to traffic analysis attacks. We specifically concentrate on SSH security and The Onion Router Tor anonymity tools. Our analysis used deterministic hidden Markov models HMMs. We used traffic timing data to analyze one of the most sophisticated and popular types of cybercrime tools -- botnet. We presented two botnet detection methods centralized botnet traffic detection using HMMs and probabilistic context-free grammars PCFGs for centralized and P2P botnet traffic detection. Finally, a hybrid network security scheme that combines the advantages of widely deployed security technologies intrusion detection systems IDS and honeypots was proposed. The scheduling problem of the security system was modeled as an average decentralized partially observable Markov decision process DEC-POMDP and solved using our nonlinear programming NLP-based solution method.
Distribution Statement:
APPROVED FOR PUBLIC RELEASE