Characterising Anomalous Events Using Change - Point Correlation on Unsolicited Network Traffic

نویسندگان

  • Ejaz Ahmed
  • Andrew J. Clark
  • George M. Mohay
چکیده

Monitoring unused or dark IP addresses offers opportunities to extract useful information about both on-going and new attack patterns. In recent years, different techniques have been used to analyze such traffic including sequential analysis where a change in traffic behavior, for example change in mean, is used as an indication of malicious activity. Change points themselves say little about detected change; further data processing is necessary for the extraction of useful information and to identify the exact cause of the detected change which is limited due to the size and nature of observed traffic. In this paper, we address the problem of analyzing a large volume of such traffic by correlating change points identified in different traffic parameters. The significance of the proposed technique is two-fold. Firstly, automatic extraction of information related to change points by correlating change points detected across multiple traffic parameters. Secondly, validation of the detected change point by the simultaneous presence of another change point in a different parameter. Using a real network trace collected from unused IP addresses, we demonstrate that the proposed technique enables us to not only validate the change point but also extract useful information about the causes of change points.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Detecting Distributed Network Traffic Anomaly with Network-Wide Correlation Analysis

Distributed network traffic anomaly refers to a traffic abnormal behavior involving many links of a network and caused by the same source (e.g., DDoS attack, worm propagation). The anomaly transiting in a single link might be unnoticeable and hard to detect, while the anomalous aggregation from many links can be prevailing, and does more harm to the networks. Aiming at the similar features of d...

متن کامل

Inferring malicious network events in commercial ISP networks using traffic summarisation

With the recent increases in bandwidth available to home users, traffic rates for commercial national networks have also been increasing rapidly. This presents a problem for any network monitoring tool as the traffic rate they are expected to monitor is rising on a monthly basis. Security within these networks is paramount as they are now an accepted home of trade and commerce. Core networks ha...

متن کامل

Network anomaly detection with the restricted Boltzmann machine

With the rapid growth and the increasing complexity of network infrastructures and the evolution of attacks, identifying and preventing network abuses is getting more and more strategic to ensure an adequate degree of protection from both external and internal menaces. In this scenario many techniques are emerging for inspecting network traffic and discriminating between anomalous and normal be...

متن کامل

An Alternative Approach to Centroids and Connectors Pattern: Random Intra-Zonal Travel Time

In traditional traffic assignment procedure, each traffic analysis zone is represented by one point in its geometric center which is connected to the network by several connectors. Results of studies show that different connector patterns would result up to 10% change in estimated volume and up to 20% change in total travel time. Also the different patterns of connectors can change the priority...

متن کامل

Session 1B Security I ISPs: Who Else Can You Trust in the Internet?

The Internet today is the main communication infrastructure for private communication and business. A protection against unsolicited traffic such as DDoS attacks is therefore in the interest of all – but, at the same time, security has to be balanced with privacy issues. This paper proposes a collaborative effort against unsolicited traffic where ISPs and end users collaborate. Users define whi...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2009