DocumentCode :
2927725
Title :
Slow port scanning detection
Author :
Dabbagh, Mehiar ; Ghandour, Ali J. ; Fawaz, Kassem ; Hajj, W.E. ; Hajj, Hazem
fYear :
2011
fDate :
5-8 Dec. 2011
Firstpage :
228
Lastpage :
233
Abstract :
Port scanning is the most popular reconnaissance technique attackers use to discover services they can break into. Port scanning detection has received a lot of attention by researchers. However a slow port scan attack can deceive most of the existing Intrusion Detection Systems (IDS). In this paper, we present a new, simple, and efficient method for detecting slow port scans. Our proposed method is mainly composed of two phases: (1) a feature collection phase that analyzes network traffic and extracts the features needed to classify a certain IP as malicious or not. (2) A classification phase that divides the IPs, based on the collected features, into three groups: normal IPs, suspicious IPs and scanner IPs. The IPs our approach classify as suspicious are kept for the next (K) time windows for further examination to decide whether they represent scanners or legitimate users. Hence, this approach is different than the traditional approach used by IDSs that classifies IPs as either legitimate or scanners, and thus producing a high number of false positives and false negatives. A small Local Area Network was put together to test our proposed method. The experiments show the effectiveness of our proposed method in correctly identifying malicious scanners when both normal and slow port scan were performed using the three most common TCP port scanning techniques. Moreover, our method detects malicious scanners that are otherwise not detected using well known IDSs such as Snort.
Keywords :
local area networks; security of data; telecommunication traffic; transport protocols; IDS; TCP port scanning techniques; feature collection phase; intrusion detection systems; local area network; reconnaissance technique attackers; slow port scanning detection; Classification algorithms; Feature extraction; IP networks; Probes; Security; Servers; Training data; Intrusion Detection System; Port Scanning;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Information Assurance and Security (IAS), 2011 7th International Conference on
Conference_Location :
Melaka
Print_ISBN :
978-1-4577-2154-0
Type :
conf
DOI :
10.1109/ISIAS.2011.6122824
Filename :
6122824
Link To Document :
بازگشت