A flow-based method for abnormal network traffic detection

被引:78
作者
Kim, MS
Kang, HJ
Hong, SC
Chung, SH
Hong, JW
机构
来源
NOMS 2004: IEEE/IFIP NETWORK OPERATIONS AND MANAGMENT SYMPOSIUM: MANAGING NEXT GENERATION CONVERGENCE NETWORKS AND SERVICES | 2004年
关键词
network security attack; abnormal network traffic detection; traffic monitoring and analysis;
D O I
10.1109/NOMS.2004.1317747
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
One recent trend in network security attacks is an increasing number of indirect attacks which influence network traffic negatively, instead of directly entering a system and damaging it. In future, damages from this type of attack are expected to become more serious. In addition, the bandwidth consumption by these attacks influences the entire network performance. This paper presents an abnormal network traffic detecting method and a system prototype. By aggregating packets that belong to the identical flow, we can reduce processing overhead in the system. We suggest a detecting algorithm using changes in traffic patterns that appear during attacks. This algorithm can detect even mutant attacks that use a new port number or changed payload, while signature-based systems are not capable of detecting these types of attacks. Furthermore, the proposed algorithm can identify attacks that cannot be detected by examining only single packet information.
引用
收藏
页码:599 / 612
页数:14
相关论文
共 20 条
[1]  
[Anonymous], P IEEE SYST MAN CYB
[2]  
Dean D., 2001, P NETW DISTR SYST SE
[3]  
FYODOR, ART PORT SCANNING
[4]  
Han SH, 2002, LECT NOTES COMPUT SC, V2506, P16
[5]  
IOANNIDIS LJ, 2002, P NETW DISTR SYST SE
[6]  
KANLAYASIRI U, 2000, P 23 EL ENG C EECON
[7]  
LAN KC, 2003, P PAM 2003 SAN DIEG
[8]  
LIFLER S, 1997, THESIS U STUTTGART G
[9]  
MOORE D, 2001, P USENIX SEC S WASH
[10]  
PENG T, DETECTING DISTRIBUTI