Detecting Root-Level Endpoint Sensor Compromises with Correlated Activity

1Citations
Citations of this article
1Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Endpoint sensors play an important role in an organization’s network defense. However, endpoint sensors may be disabled or sabotaged if an adversary gains root-level access to the endpoint running the sensor. While traditional sensors cannot reliably defend against such compromises, this work explores an approach to detect these compromises in applications where multiple sensors can be correlated. We focus on the OpenFlow protocol and show that endpoint sensor data can be corroborated using a remote endpoint’s sensor data or that of in-network sensors, like an OpenFlow switch. The approach allows end-to-end round trips of less than 20ms for around 90% of flows, which includes all flow elevation and processing overheads. In addition, the approach can detect flows from compromised nodes if there is a single uncompromised sensor on the network path. This approach allows defenders to quickly identify and quarantine nodes with compromised endpoint sensors.

Cite

CITATION STYLE

APA

Lei, Y., & Shue, C. A. (2019). Detecting Root-Level Endpoint Sensor Compromises with Correlated Activity. In Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, LNICST (Vol. 305 LNICST, pp. 273–286). Springer. https://doi.org/10.1007/978-3-030-37231-6_15

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free