Structural traffic analysis for network security monitoring

نویسنده

  • Christian Peter Kreibich
چکیده

Traffic on the Internet is constantly growing more complex and multifaceted. This natural evolution is mirrored by novel kinds of malicious traffic: automated attacks subvert thousands of machines at a time, enabling a wide range of subsequent attacks and nuisances such as distributed denial-of-service attacks and generation of vast amounts of unsolicited electronic mail. Consequently, there is a strong need to be able to tell malicious traffic from the benign. In this dissertation, I take several steps toward this goal. By leveraging structural aspects of network traffic, typical as well as malicious activity on computer networks can be fingerprinted and contrasted. A first avenue is the analysis of application-level flow content. I investigate the suitability of biological sequence alignment algorithms in the adversarial environment of the networking domain, and introduce a novel algorithm that is well over an order of magnitude faster than the commonly used Smith-Waterman algorithm while maintaining much of its flexibility. I introduce a novel and highly flexible model of traffic content based on sequence alignment, Common Substring Graphs, and demonstrate its versatility in a study of application-level protocol classification. Switching focus to the malicious, I pioneer the use of honeypots and sequence analysis algorithms for automated fingerprinting of malware and thus demonstrate the feasibility of fully automated network-based malware signature generation. I propose a second approach to fingerprinting the malicious: Packet Symmetry focuses on network-level structure and leverages the intuition that well-behaved applications do not transmit vastly more packets than they receive. Traffic analysis confirms the feasibility of employing packet symmetry for edge-based, ingress-focused prevention strategies for volume-based attacks.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Detecting Active Bot Networks Based on DNS Traffic Analysis

Abstract—One of the serious threats to cyberspace is the Bot networks or Botnets. Bots are malicious software that acts as a network and allows hackers to remotely manage and control infected computer victims. Given the fact that DNS is one of the most common protocols in the network and is essential for the proper functioning of the network, it is very useful for monitoring, detecting and redu...

متن کامل

Detecting Bot Networks Based On HTTP And TLS Traffic Analysis

Abstract— Bot networks are a serious threat to cyber security, whose destructive behavior affects network performance directly. Detecting of infected HTTP communications is a big challenge because infected HTTP connections are clearly merged with other types of HTTP traffic. Cybercriminals prefer to use the web as a communication environment to launch application layer attacks and secretly enga...

متن کامل

Improving Tor security against timing and traffic analysis attacks with fair randomization

The Tor network is probably one of the most popular online anonymity systems in the world. It has been built based on the volunteer relays from all around the world. It has a strong scientific basis which is structured very well to work in low latency mode that makes it suitable for tasks such as web browsing. Despite the advantages, the low latency also makes Tor insecure against timing and tr...

متن کامل

Location-allocation of traffic police patrols in the suburban network

Nowadays, due to population increase and expansion of the transportation networks, the monitoring of this network, control, and prevention of accidents and crimes are very important. The main tasks of traffic patrols, like other emergency-security facilities, are the monitoring and prevention of crime as well as handling and fining in the case of committing crimes. Traffic patrols should be pre...

متن کامل

Security Analysis of Lightweight Authentication Scheme with Key Agreement using Wireless Sensor Network for Agricultural Monitoring System

Wireless sensor networks have many applications in the real world and have been developed in various environments. But the limitations of these networks, including the limitations on the energy and processing power of the sensors, have posed many challenges to researchers. One of the major challenges is the security of these networks, and in particular the issue of authentication in the wireles...

متن کامل

Classification of encrypted traffic for applications based on statistical features

Traffic classification plays an important role in many aspects of network management such as identifying type of the transferred data, detection of malware applications, applying policies to restrict network accesses and so on. Basic methods in this field were using some obvious traffic features like port number and protocol type to classify the traffic type. However, recent changes in applicat...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2007