"Flow Size Difference" Can Make a Difference: Detecting Malicious TCP Network Flows Based on Benford's Law

نویسندگان

  • Aamo Iorliam
  • Santosh Tirunagari
  • Anthony Tung Shuen Ho
  • Shujun Li
  • Adrian Waller
  • Norman Poh
چکیده

Statistical characteristics of network traffic have attracted a significant amount of research for automated network intrusion detection, some of which looked at applications of natural statistical laws such as Zipf’s law, Benford’s law and the Pareto distribution. In this paper, we present the application of Benford’s law to a new network flow metric “flow size difference”, which have not been studied by other researchers, to build an unsupervised flow-based intrusion detection system (IDS). The method was inspired by our observation on a large number of TCP flow datasets where normal flows tend to follow Benford’s law closely but malicious flows tend to deviate significantly from it. The proposed IDS is unsupervised so no training is needed thus can be easily deployed. It has two simple parameters with a clear semantic meaning, allowing the human operator to set and adapt their values intuitively to adjust the overall performance of the IDS. We tested the proposed IDS on one closed and two public datasets and proved its efficiency in terms of AUC (area under the ROC curve). Being a simple and fast standalone IDS itself, the proposed method can also be easily combined with other network IDSs e.g. added as an additional component into another existing IDS to enhance its performance.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A Large Scale Simulation Study: Impact of Unresponsive Malicious Flows

Researches have unveiled that about 85% of current Internet traffic is contributed by TCP flows, and the network stability mostly depends on end-to-end TCP congestion control. This paper studies the performance of various queue management algorithms implemented in current Internet routers when unresponsive high-rate malicious flows coexist in the network. Our analysis is based on large scale si...

متن کامل

A Filtering Algorithm for Controlling High Rate Unresponsive Flows

The inconsistency of responding to network congestion leaves the Interent protocols be potentially the targets of malicious users. Since unresponsive flows (e.g., UDP) do not cut down their sending rate while experiencing packet losses, they could deplete fair share of the bandwidth allocated for responsive flows (e.g., TCP). In this paper, we propose an approach to filter high rate unresponsiv...

متن کامل

Flow-aggregation Accelerating Strategy for TCP Traffic

A great number of researches on network flow characteristics show a large proportion of the network flows are single-packet flows. However, almost all existing flow termination strategies have no optimization for singlepacket flows, so the efficiency of flow-aggregation is lower. Based on in-depth study of flow characteristics and TCP protocol specifications, we find the packet status, packet a...

متن کامل

Sizing Router Buffers (Extended Version)

All Internet routers contain buffers to hold packets during times of congestion. Today, the size of the buffers is determined by the dynamics of TCP’s congestion control algorithm. In particular, the goal is to make sure that when a link is congested, it is busy 100% of the time; which is equivalent to making sure its buffer never goes empty. A widely used rule-of-thumb states that each link ne...

متن کامل

Sizing Router Buffers (Sigcomm 2004)

All Internet routers contain buffers to hold packets during times of congestion. Today, the size of the buffers is determined by the dynamics of TCP’s congestion control algorithm. In particular, the goal is to make sure that when a link is congested, it is busy 100% of the time; which is equivalent to making sure its buffer never goes empty. A widely used rule-of-thumb states that each link ne...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • CoRR

دوره abs/1609.04214  شماره 

صفحات  -

تاریخ انتشار 2016