"Flow Size Difference" Can Make a Difference: Detecting Malicious TCP Network Flows Based on Benford's Law
نویسندگان
چکیده
Statistical characteristics of network traffic have attracted a significant amount of research for automated network intrusion detection, some of which looked at applications of natural statistical laws such as Zipf’s law, Benford’s law and the Pareto distribution. In this paper, we present the application of Benford’s law to a new network flow metric “flow size difference”, which have not been studied by other researchers, to build an unsupervised flow-based intrusion detection system (IDS). The method was inspired by our observation on a large number of TCP flow datasets where normal flows tend to follow Benford’s law closely but malicious flows tend to deviate significantly from it. The proposed IDS is unsupervised so no training is needed thus can be easily deployed. It has two simple parameters with a clear semantic meaning, allowing the human operator to set and adapt their values intuitively to adjust the overall performance of the IDS. We tested the proposed IDS on one closed and two public datasets and proved its efficiency in terms of AUC (area under the ROC curve). Being a simple and fast standalone IDS itself, the proposed method can also be easily combined with other network IDSs e.g. added as an additional component into another existing IDS to enhance its performance.
منابع مشابه
A Large Scale Simulation Study: Impact of Unresponsive Malicious Flows
Researches have unveiled that about 85% of current Internet traffic is contributed by TCP flows, and the network stability mostly depends on end-to-end TCP congestion control. This paper studies the performance of various queue management algorithms implemented in current Internet routers when unresponsive high-rate malicious flows coexist in the network. Our analysis is based on large scale si...
متن کاملA Filtering Algorithm for Controlling High Rate Unresponsive Flows
The inconsistency of responding to network congestion leaves the Interent protocols be potentially the targets of malicious users. Since unresponsive flows (e.g., UDP) do not cut down their sending rate while experiencing packet losses, they could deplete fair share of the bandwidth allocated for responsive flows (e.g., TCP). In this paper, we propose an approach to filter high rate unresponsiv...
متن کاملFlow-aggregation Accelerating Strategy for TCP Traffic
A great number of researches on network flow characteristics show a large proportion of the network flows are single-packet flows. However, almost all existing flow termination strategies have no optimization for singlepacket flows, so the efficiency of flow-aggregation is lower. Based on in-depth study of flow characteristics and TCP protocol specifications, we find the packet status, packet a...
متن کاملSizing Router Buffers (Extended Version)
All Internet routers contain buffers to hold packets during times of congestion. Today, the size of the buffers is determined by the dynamics of TCP’s congestion control algorithm. In particular, the goal is to make sure that when a link is congested, it is busy 100% of the time; which is equivalent to making sure its buffer never goes empty. A widely used rule-of-thumb states that each link ne...
متن کاملSizing Router Buffers (Sigcomm 2004)
All Internet routers contain buffers to hold packets during times of congestion. Today, the size of the buffers is determined by the dynamics of TCP’s congestion control algorithm. In particular, the goal is to make sure that when a link is congested, it is busy 100% of the time; which is equivalent to making sure its buffer never goes empty. A widely used rule-of-thumb states that each link ne...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- CoRR
دوره abs/1609.04214 شماره
صفحات -
تاریخ انتشار 2016