DocumentCode :
3456655
Title :
Detecting Step-Stone with Network Traffic Mining Approach
Author :
Hsiao, Han-Wei ; Fan, Wei-Cheng
Author_Institution :
Dept. of Inf. Manage., Nat. Univ. of Kaohsiung, Kaohsiung, Taiwan
fYear :
2009
fDate :
7-9 Dec. 2009
Firstpage :
1176
Lastpage :
1179
Abstract :
In recent years, many network users has been the serious impact by the intrusion of the Internet, there are many attack events occur at the present time. On the Internet, the intruders usually launch attacks from the stepping stone that they previously compromised. In this way, the attackers can reduce their risk of directly detected. Even if the network managers detect the invasion that still can´t identify the true attack intruders IP location through the observation records. And there are many network attacks using a large amount of stepping stone to launch a joint flooding attack at the same time. The victim computer or Web site will not bear this kind large flood traffic that make the servers cannot work properly to provide normal Internet services. The problem of stepping stone has being caused serious impact on network security. In this study, we use the association rules mining technique to establish an automatically stepping stone detection module. By collect the connecting records in the local network to gather the information of source and destination IP addresses in the same period. The traffic data analyse by association rule algorithms trying to figure out the transmission characteristics of the stepping stone. By identifying the suspicious IP addresses of stepping stone will be helpful for the network security administrators to improve the security of network.
Keywords :
IP networks; Internet; computer network security; data mining; telecommunication traffic; Internet services; Web site; association rules mining technique; destination IP addresses; joint flooding attack; network attacks; network managers; network security administrators; network traffic mining approach; source IP addresses; stepping stone detection module; victim computer; Association rules; Computer network management; Data security; Floods; IP networks; Information security; Internet; Network servers; Telecommunication traffic; Web server;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Innovative Computing, Information and Control (ICICIC), 2009 Fourth International Conference on
Conference_Location :
Kaohsiung
Print_ISBN :
978-1-4244-5543-0
Type :
conf
DOI :
10.1109/ICICIC.2009.172
Filename :
5412355
Link To Document :
بازگشت