A flow-based method for abnormal network traffic detection

被引:77
|
作者
Kim, MS
Kang, HJ
Hong, SC
Chung, SH
Hong, JW
机构
来源
NOMS 2004: IEEE/IFIP NETWORK OPERATIONS AND MANAGMENT SYMPOSIUM: MANAGING NEXT GENERATION CONVERGENCE NETWORKS AND SERVICES | 2004年
关键词
network security attack; abnormal network traffic detection; traffic monitoring and analysis;
D O I
10.1109/NOMS.2004.1317747
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
One recent trend in network security attacks is an increasing number of indirect attacks which influence network traffic negatively, instead of directly entering a system and damaging it. In future, damages from this type of attack are expected to become more serious. In addition, the bandwidth consumption by these attacks influences the entire network performance. This paper presents an abnormal network traffic detecting method and a system prototype. By aggregating packets that belong to the identical flow, we can reduce processing overhead in the system. We suggest a detecting algorithm using changes in traffic patterns that appear during attacks. This algorithm can detect even mutant attacks that use a new port number or changed payload, while signature-based systems are not capable of detecting these types of attacks. Furthermore, the proposed algorithm can identify attacks that cannot be detected by examining only single packet information.
引用
收藏
页码:599 / 612
页数:14
相关论文
共 50 条
  • [1] Intrusion Detection Using Flow-Based Analysis of Network Traffic
    David, Jisa
    Thomas, Ciza
    ADVANCES IN NETWORKS AND COMMUNICATIONS, PT II, 2011, 132 : 391 - 399
  • [2] Detection of slow port scans in flow-based network traffic
    Ring, Markus
    Landes, Dieter
    Hotho, Andreas
    PLOS ONE, 2018, 13 (09):
  • [3] Network Security Detection Method Based on Abnormal Traffic Detection
    Xiao, Tao
    Ke, Yang
    Hu, Yiwen
    Wang, Hongya
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2023, 14 (11) : 1093 - 1103
  • [4] Scalable network architecture for flow-based traffic control
    Song, Jongtae
    Lee, Soon Seok
    Kang, Kug-Chang
    Park, Noik
    Park, Heuk
    Ybon, Sunghyun
    Chun, Kyung Gyu
    Chang, Mi Young
    Joung, Jinoo
    Kim, Young Sun
    ETRI JOURNAL, 2008, 30 (02) : 205 - 215
  • [5] Network Traffic Characterisation Using Flow-Based Statistics
    Velan, Peter
    Medkova, Jana
    Jirsik, Tomas
    Celeda, Pave
    NOMS 2016 - 2016 IEEE/IFIP NETWORK OPERATIONS AND MANAGEMENT SYMPOSIUM, 2016, : 907 - 912
  • [6] FlowOS: A Pure Flow-based Vision of Network Traffic
    Alim, Abdul
    Bezahaf, Mehdi
    Mathy, Laurent
    PROCEEDINGS OF THE EIGHTH ACM/IEEE SYMPOSIUM ON ARCHITECTURES FOR NETWORKING AND COMMUNICATIONS SYSTEMS (ANCS'12), 2012, : 143 - 144
  • [7] DDoS Attack Detection using Fast Entropy Approach on Flow-Based Network Traffic
    David, Jisa
    Thomas, Ciza
    BIG DATA, CLOUD AND COMPUTING CHALLENGES, 2015, 50 : 30 - 36
  • [8] Efficient DDoS flood attack detection using dynamic thresholding on flow-based network traffic
    David, Jisa
    Thomas, Ciza
    COMPUTERS & SECURITY, 2019, 82 : 284 - 295
  • [9] Flow-based relaxation method for edge detection
    Yoon, KC
    Park, KH
    ELECTRONICS LETTERS, 1996, 32 (01) : 28 - 29
  • [10] DeepGFL: Deep Feature Learning via Graph for Attack Detection on Flow-based Network Traffic
    Yao, Yepeng
    Su, Liya
    Lu, Zhigang
    2018 IEEE MILITARY COMMUNICATIONS CONFERENCE (MILCOM 2018), 2018, : 579 - 584