• DocumentCode
    3100745
  • Title

    Characterizing Transition Behaviors in Internet Attack Sequences

  • Author

    Du, Haitao ; Yang, Shanchieh Jay

  • Author_Institution
    Dept. of Comput. Eng., Rochester Inst. of Technol., Rochester, NY, USA
  • fYear
    2011
  • fDate
    July 31 2011-Aug. 4 2011
  • Firstpage
    1
  • Lastpage
    6
  • Abstract
    Cyber attacks from the Internet often span over multiple ports and multiple hosts. This work hypothesizes that there are distinct sequential patterns revealing hacking behavior. A feature called Attack Transition Action (ATA) is defined to represent the changes on attacked destinations and ports over time. The simplicity of the feature enables the development of a probabilistic model, revealing higher order transitions hidden within the attack sequences. The model trained with a real-world attack dataset uncovers several natural clusters of Internet attack behaviors. The discovered behavior patterns are explained with representative hacking strategies. Our systematic modeling and analysis provides an effective means to characterize classes of Internet attacks.
  • Keywords
    Internet; computer crime; computer network security; probability; Cyber attacks; Internet; attack sequences; attack transition action; hacking strategy; natural clusters; probabilistic model; Complexity theory; Computer crime; Computer hacking; IP networks; Internet; Markov processes; Training;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Computer Communications and Networks (ICCCN), 2011 Proceedings of 20th International Conference on
  • Conference_Location
    Maui, HI
  • ISSN
    1095-2055
  • Print_ISBN
    978-1-4577-0637-0
  • Type

    conf

  • DOI
    10.1109/ICCCN.2011.6006017
  • Filename
    6006017