Monitoring and analysis of internet traffic targeting unused address spaces
| Data(s) |
2010
|
|---|---|
| Resumo |
Today’s evolving networks are experiencing a large number of different attacks ranging from system break-ins, infection from automatic attack tools such as worms, viruses, trojan horses and denial of service (DoS). One important aspect of such attacks is that they are often indiscriminate and target Internet addresses without regard to whether they are bona fide allocated or not. Due to the absence of any advertised host services the traffic observed on unused IP addresses is by definition unsolicited and likely to be either opportunistic or malicious. The analysis of large repositories of such traffic can be used to extract useful information about both ongoing and new attack patterns and unearth unusual attack behaviors. However, such an analysis is difficult due to the size and nature of the collected traffic on unused address spaces. In this dissertation, we present a network traffic analysis technique which uses traffic collected from unused address spaces and relies on the statistical properties of the collected traffic, in order to accurately and quickly detect new and ongoing network anomalies. Detection of network anomalies is based on the concept that an anomalous activity usually transforms the network parameters in such a way that their statistical properties no longer remain constant, resulting in abrupt changes. In this dissertation, we use sequential analysis techniques to identify changes in the behavior of network traffic targeting unused address spaces to unveil both ongoing and new attack patterns. Specifically, we have developed a dynamic sliding window based non-parametric cumulative sum change detection techniques for identification of changes in network traffic. Furthermore we have introduced dynamic thresholds to detect changes in network traffic behavior and also detect when a particular change has ended. Experimental results are presented that demonstrate the operational effectiveness and efficiency of the proposed approach, using both synthetically generated datasets and real network traces collected from a dedicated block of unused IP addresses. |
| Formato |
application/pdf application/pdf |
| Identificador | |
| Publicador |
Queensland University of Technology |
| Relação |
http://eprints.qut.edu.au/34075/1/Ejaz_Ahmed_Thesis.pdf http://eprints.qut.edu.au/34075/2/Ejaz_Ahmed_Citation.pdf Ahmed, Ejaz (2010) Monitoring and analysis of internet traffic targeting unused address spaces. PhD thesis, Queensland University of Technology. |
| Fonte |
Faculty of Science and Technology; Information Security Institute |
| Palavras-Chave | #Unused address spaces, darknets, change detection, nested change detection, cumulativesum, sliding window, change point correlation |
| Tipo |
Thesis |