Advanced Persistent Threat Detection Based On Network Traffic Noise Pattern and Analysis

نویسندگان

  • Akademia Baru
  • S. C. Y. Ng
  • M. Bakhtiari
چکیده

Abstract – Advanced persistent threat (APT) is a network attack in which an unauthorized person gains access to a network and remain undetected for as long as they can. The intention of an APT attack is to steal data and eavesdropping rather than to cause damage to the network or organization. The problem of APT is the techniques used are stealth oriented and detection of APT attack has been difficult and even almost impossible in the early stage of penetration by exploiting Zero Day Vulnerabilities. This research is aimed at different angles of perspectives in order to detect APT attack by focusing at different areas besides Zero-Day Vulnerabilities. The new approach will detect APT by analyzing the traffic in between attacker and victim in a controlled virtual environment. By analyzing the traffic, this research has collected some samples of evidence in order to aid in APT detection. The achievements of this research are the evidences of connection and traffic patterns of each attack function recorded in traffic monitoring tools. All data were collected to be analyze and patterns of communication were recorded in a graph form in order to provide a clear picture for the researcher to identify the common pattern as an evidence to be picked up when an attack is going on and able to alert the victim. The future work of this research is to implement proposed framework with the actual network of computers with real life networking peripherals and real computer system instead of virtual environment. Besides, this research aimed to analyze the “Knock On” technique used by hacker to contact the C & C Server on demand. Copyright © 2016 Penerbit Akademia Baru All rights reserved.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Detecting Bot Networks Based On HTTP And TLS Traffic Analysis

Abstract— Bot networks are a serious threat to cyber security, whose destructive behavior affects network performance directly. Detecting of infected HTTP communications is a big challenge because infected HTTP connections are clearly merged with other types of HTTP traffic. Cybercriminals prefer to use the web as a communication environment to launch application layer attacks and secretly enga...

متن کامل

Incident Detection Algorithm using Wavelet Energy Representation of Traffic Patterns

Automatic freeway incident detection is an important component of advanced transportation management systems ~ATMS! that provides information for emergency relief and traffic control and management purposes. Earlier algorithms for freeway incident problems have produced less reliable results, especially in recurrent congestion and compression wave traffic conditions. This article presents a new...

متن کامل

Behavioral Analysis of Traffic Flow for an Effective Network Traffic Identification

Fast and accurate network traffic identification is becoming essential for network management, high quality of service control and early detection of network traffic abnormalities. Techniques based on statistical features of packet flows have recently become popular for network classification due to the limitations of traditional port and payload based methods. In this paper, we propose a metho...

متن کامل

Literature Review of Traffic Assignment: Static and Dynamic

Rapid urban growth is resulting into increase in travel demand and private vehicle ownership in urban areas. In the present scenario the existing infrastructure has failed to match the demand that leads to traffic congestion, vehicular pollution and accidents. With traffic congestion augmentation on the road, delay of commuters has increased and reliability of road network has decreased. Four s...

متن کامل

An analysis framework to aid in designing advanced persistent threat detection systems

Cyber-attacks against companies and governments are increasing in complexity, persistence and numbers. Attackers take more time and effort to remain undetected than previously known multistep attacks. Common intrusion detection methods lack in their ability to detect such complex attacks. A new approach to detection is therefore needed which takes the stepwise characteristics of these new threa...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2016