Identification of Repeated DoS Attacks using Network Traffic Forensics
نویسندگان
چکیده
Once an attacker has compromised a set of machines, typically, he will repeatedly deploy the same set of machines to attack different targets. In this paper, we propose a method to identify repeated attack scenarios, that is, the combination of a particular set of hosts and attack tool, by making use of pattern recognition techniques. While previous methods have focused on intrusion detection using anomaly and signature matching based primarily on header content, our approach attempts to identify unique fingerprints encoded in the packet arrival streams created by the attacker and the attack tool. We investigate the plausibility of our approach on real-world attacks captured at a regional ISP. We designed a multi-dimensional maximum-likelihood classifier to identify repeated attack scenarios based on spectral content of the attack. The preliminary results indicate that in addition to having similar header content, repeated attacks also have similar spectral behavior. We conducted controlled experiments to isolate factors that affect the attack fingerprint. Such an attack scenario identification system can be used to investigate and establish attribution of the DoS attacks, and could also be used to estimate the deployment of a particular attack tool.
منابع مشابه
Avoiding Cyber-attacks to DMZ and Capturing Forensics from Intruders Using Honeypots
Nowadays, honeypots are widely used to divert attackers from the original target and keep them busy within a decoy environment. DeMilitarized Zone (DMZ) is an important zone for network administrators, because many of the services to the public network is provided at this zone. Many of the security tools such as firewalls, intrusion detection systems and several other secu...
متن کاملAvoiding Cyber-attacks to DMZ and Capturing Forensics from Intruders Using Honeypots
Nowadays, honeypots are widely used to divert attackers from the original target and keep them busy within a decoy environment. DeMilitarized Zone (DMZ) is an important zone for network administrators, because many of the services to the public network is provided at this zone. Many of the security tools such as firewalls, intrusion detection systems and several other secu...
متن کاملInternet Forensics Framework Based-on Clustering
Internet network attacks are complicated and worth studying. The attacks include Denial of Service (DoS). DoS attacks that exploit vulnerabilities found in operating systems, network services and applications. Indicators of DoS attacks, is when legitimate users cannot access the system. This paper proposes a framework for Internet based forensic logs that aims to assist in the investigation pro...
متن کاملIdentification of Repeated Attacks Using Network Traffic Forensics
Denial-of-service attacks on the Internet today are often launched from zombies, multiple compromised machines controlled by an attacker. Attackers often take control of a number of zombies and then repeatedly use this army to attack a target several times, or to attack several targets. In this paper, we propose a method to identify repeated attack scenarios, that is, the combination of a parti...
متن کاملDNS in Computer Forensics
The Domain Name Service (DNS) is a critical core component of the global Internet and integral to the majority of corporate intranets. It provides resolution services between the human-readable name-based system addresses and the machine operable Internet Protocol (IP) based addresses required for creating network level connections. Whilst structured as a globally dispersed resilient tree data ...
متن کامل