DocumentCode :
2943881
Title :
On detecting and clustering distributed cyber scanning
Author :
Bou-Harb, Elias ; Debbabi, Mourad ; Assi, Chadi
Author_Institution :
CIISE, Concordia Univ., Montreal, QC, Canada
fYear :
2013
fDate :
1-5 July 2013
Firstpage :
926
Lastpage :
933
Abstract :
This paper proposes an approach that is composed of two techniques that respectively tackle the issues of detecting corporate cyber scanning and clustering distributed reconnaissance activity. The first employed technique is based on a non-attribution anomaly detection approach that focuses on what is being scanned rather than who is performing the scanning. The second technique adopts a statistical time series approach that is rendered by observing the correlation status of a traffic signal to perform the identification and clustering. To empirically validate both techniques, we experiment with two real network traffic datasets and implement two proof-of-concept environments. The first dataset comprises of unsolicited one-way telescope/darknet traffic while the second dataset has been captured in our lab through a customized setup. The results show, on one hand, that for a class C network with 250 active hosts and 5 monitored servers, the proposed detection technique´s training period required a stabilization time of less than 1 second and a state memory of 80 bytes. Moreover, in comparison with Snort´s sfPortscan technique, it was able to detect 4215 unique scans and yielded zero false negative. On the other hand, the proposed clustering technique is able to correctly identify and cluster the scanning machines with high accuracy even in the presence of legitimate traffic.
Keywords :
computer crime; correlation methods; distributed processing; pattern clustering; telecommunication traffic; time series; Snort sfPortscan technique; corporate cyber scanning; correlation status; distributed cyber scanning clustering; distributed cyber scanning detection; distributed reconnaissance activity; network traffic datasets; nonattribution anomaly detection approach; scanning machines; stabilization time; state memory; statistical time series; traffic signal; unsolicited one-way telescope/darknet traffic; Doped fiber amplifiers; IP networks; Ports (Computers); Protocols; Servers; Time series analysis; Training;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Wireless Communications and Mobile Computing Conference (IWCMC), 2013 9th International
Conference_Location :
Sardinia
Print_ISBN :
978-1-4673-2479-3
Type :
conf
DOI :
10.1109/IWCMC.2013.6583681
Filename :
6583681
Link To Document :
بازگشت