CMU-CS-03-109
Computer Science Department
School of Computer Science, Carnegie Mellon University



CMU-CS-03-109

Finding and Containing Enemies within the Walls
with Self-securing Network Interfaces

Gregory R. Ganger, Gregg Economou, Stanley M. Bielski

January 2003

CMU-CS-03-109.ps
CMU-CS-03-109.pdf


Keywords: Network security, intrusion detection, firewall, proxy, virus, worm, NIC


Self-securing network interfaces (NIs) examine the packets that they move between network links and host software, looking for and potentially blocking malicious network activity. This paper describes how self-securing network interfaces can help administrators to identify and contain compromised machines within their intranet. By shadowing host state, self-securing NIs can better identify suspicious traffic originating from that host, including many explicitly designed to defeat network intrusion detection systems. With normalization and detection-triggered throttling, self-securing NIs can reduce the ability of compromised hosts to launch attacks on other systems inside (or outside) the intranet. We describe a prototype self-securing NI and example scanners for detecting such things as TTL abuse, fragmentation abuse, "SYN bomb" attacks, and random-propagation worms like Code-Red.

24 pages


Return to: SCS Technical Report Collection
School of Computer Science homepage

This page maintained by reports@cs.cmu.edu