Fool me if you can: mimicking attacks and anti-attacks in cyberspace


Autoria(s): Yu, Shui; Guo, Song; Stojmenovic, Ivan
Data(s)

01/01/2015

Resumo

Botnets have become major engines for malicious activities in cyberspace nowadays. To sustain their botnets and disguise their malicious actions, botnet owners are mimicking legitimate cyber behavior to fly under the radar. This poses a critical challenge in anomaly detection. In this paper, we use web browsing on popular web sites as an example to tackle this problem. First of all, we establish a semi-Markov model for browsing behavior. Based on this model, we find that it is impossible to detect mimicking attacks based on statistics if the number of active bots of the attacking botnet is sufficiently large (no less than the number of active legitimate users). However, we also find it is hard for botnet owners to satisfy the condition to carry out a mimicking attack most of the time. With this new finding, we conclude that mimicking attacks can be discriminated from genuine flash crowds using second order statistical metrics. We define a new fine correntropy metrics and show its effectiveness compared to others. Our real world data set experiments and simulations confirm our theoretical claims. Furthermore, the findings can be widely applied to similar situations in other research fields.

Identificador

http://hdl.handle.net/10536/DRO/DU:30077294

Idioma(s)

eng

Publicador

IEEE

Relação

http://dro.deakin.edu.au/eserv/DU:30077294/yu-foolmeifyoucan-2015.pdf

http://www.dx.doi.org/10.1109/TC.2013.191

Direitos

2015, IEEE

Palavras-Chave #Science & Technology #Technology #Computer Science, Hardware & Architecture #Engineering, Electrical & Electronic #Computer Science #Engineering #Mimicking #flash crowd attack #detection #second order metrics #BROWSING BEHAVIOR #SERVICE ATTACKS #DDOS ATTACKS #MARKOV MODEL #WEB #DISTRIBUTIONS #USERS
Tipo

Journal Article