ChamaleoNet: Programmable Passive Probe for Enhanced Visibility on Erroneous Traffic
By: Zhihao Wang , Alessandro Cornacchia , Andrea Bianco and more
Potential Business Impact:
Finds hidden computer problems and attacks.
Traffic visibility remains a key component for management and security operations. Observing unsolicited and erroneous traffic, such as unanswered traffic or errors, is fundamental to detect misconfiguration, temporary failures or attacks. ChamaleoNet transforms any production network into a transparent monitor to let administrators collect unsolicited and erroneous traffic directed to hosts, whether offline or active, hosting a server or a client, protected by a firewall, or unused addresses. ChamaleoNet is programmed to ignore well-formed traffic and collect only erroneous packets, including those generated by misconfigured or infected internal hosts, and those sent by external actors which scan for services. Engineering such a system poses several challenges, from scalability to privacy. Leveraging the SDN paradigm, ChamaleoNet processes the traffic flowing through a campus/corporate network and focuses on erroneous packets only, lowering the pressure on the collection system while respecting privacy regulations by design. ChamaleoNet enables the seamless integration with active deceptive systems like honeypots that can impersonate unused hosts/ports/services and engage with senders. The SDN in-hardware filtering reduces the traffic to the controller by 96%, resulting in a scalable solution, which we offer as open source. Simple analytics unveil internal misconfigured and infected hosts, identify temporary failures, and enhance visibility on external radiation produced by attackers looking for vulnerable services.
Similar Papers
RevealNet: Distributed Traffic Correlation for Attack Attribution on Programmable Networks
Cryptography and Security
Finds hidden attackers in computer networks.
A Hard-Label Black-Box Evasion Attack against ML-based Malicious Traffic Detection Systems
Cryptography and Security
Makes computer attacks hide from security systems.
Merit Network Telescope: Processing and Initial Insights from Nearly 20 Years of Darknet Traffic for Cybersecurity Research
Social and Information Networks
Finds internet attacks by watching network traffic.