On fingerprinting probing activities

نویسندگان

  • Elias Bou-Harb
  • Mourad Debbabi
  • Chadi Assi
چکیده

Motivated by recent cyber attacks that were facilitated through probing, limited cyber security intelligence and the lack of accuracy that is provided by scanning detection systems, this paper presents a new approach to fingerprint probing activity. It investigates whether the perceived traffic refers to probing activities and which exact scanning technique is being employed to perform the probing. Further, this work strives to examine probing traffic dimensions to infer the ‘machinery’ of the scan; whether the probing is random or follows a certain predefined pattern; which probing strategy is being employed; and whether the probing activity is generated from a software tool or from a worm/bot. The approach leverages a number of statistical techniques, probabilistic distribution methods and observations in an attempt to understand and analyze probing activities. To prevent evasion, the approach formulates this matter as a change point detection problem that yielded motivating results. Evaluations performed using 55 GB of real darknet traffic shows that the extracted inferences exhibit promising accuracy and can generate significant insights that could be used for mitigation purposes. a 2014 Elsevier Ltd. All rights reserved.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

CSC-Detector: A System to Infer Large-Scale Probing Campaigns

This paper uniquely leverages unsolicited real darknet data to propose a novel system, CSC-Detector, that aims at identifying Cyber Scanning Campaigns. The latter define a new phenomenon of probing events that are distinguished by their orchestration (i.e., coordination) patterns. To achieve its aim, CSC-Detector adopts three engines. Its fingerprinting engine exploits a unique observation to e...

متن کامل

Biocontrol Activities of Gamma Induced Mutants of Trichoderma harzianum against some Soilborne Fungal Pathogens and their DNA Fingerprinting

Background: Random induced mutation by gamma radiation is one of the genetic manipulation strategies to improve the antagonistic ability of biocontrol agents. Objectives: This study aimed to induce mutants with more sporulation, colonization rate leading to enhanced antagonistic ability (in vitro assay) comparing to wild type (WT) and the assessment of genetic differences (in situ evaluat...

متن کامل

Which genetic marker for which conservation genetics issue?

Conservation genetics focuses on the effects of contemporary genetic structuring on long-term survival of a species. It helps wildlife managers protect biodiversity by identifying a series of conservation units, which include species, evolutionarily significant units (ESUs), management units (MUs), action units (AUs), and family nets (FNs). Although mitochondrial DNA (mtDNA) evolves 5-10 times ...

متن کامل

Detecting and Defending against Web-Server Fingerprinting

Cyber attacks continue to increase in sophistication. Advanced attackers often gather information about a target system before launching a precise attack to exploit a discovered vulnerability. This paper discusses techniques for remote identification of web servers and suggests possible defenses to the probing activity. General concepts of fingerprinting and their application to the identificat...

متن کامل

Origin of aeolian sediments based on geochemical traces By sedimentary fingerprinting method

Abstract The destructive effects of wind erosion on the environment and human activities have led to the identification and quantification of sources of wind sediments as an important issue for planners. Due to the importance of the subject, in this study, the origin of wind sediments in Jalali sands has been investigated. To achieve this, after mapping the geomorphological facies of the study...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • Computers & Security

دوره 43  شماره 

صفحات  -

تاریخ انتشار 2014