Theoretic derivations of scan detection operating on darknet traffic

被引:6
|
作者
Pour, Morteza Safaei [1 ]
Bou-Harb, Elias [1 ]
机构
[1] Florida Atlantic Univ, Cyber Threat Intelligence Lab, Coll Engn & Comp Sci, Boca Raton, FL 33431 USA
基金
美国国家科学基金会;
关键词
Probing activities; Stochastic analysis; Botnet analysis; Darknet traffic; Data analytics; Network telescope; CYBER; BRO;
D O I
10.1016/j.comcom.2019.08.014
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Cyber space continues to be threatened by various debilitating attacks. In this context, executing passive measurements by analyzing Internet-scale, one-way darknet traffic has proven to be an effective approach to shed light on Internet-wide maliciousness. While typically such measurements are solely conducted from the empirical perspective on already deployed darknet IP spaces using off-the-shelf Intrusion Detection Systems (IDS), their multidimensional theoretical foundations, relations and implications continue to be obscured. In this article, we take a first step towards comprehending the relation between attackers' behaviors, the width of the darknet vantage points, the probability of detection and the minimum detection time. We perform stochastic modeling, derivation, validation, inter-correlation and analysis of such parameters to provide numerous insightful inferences, such as the most effective IDS and the most suitable darknet IP space, given various attackers' activities in the presence of detection time/probability constraints. One of the outcomes suggests that the detection strategy employed by the widely-deployed Bro IDS is ideal for inferring slow, stealthy probing activities by leveraging passive measurements. Further, the results do not recommend deploying the strategy utilized by the Snort IDS when the available darknet IP space is relatively small, which is a typical scenario when darknets are operated and employed on organizational networks. In addition, we provide an optimization problem set that identifies a new botnet early infection strategy, which can be leveraged by evolving stealthy bots to circumvent a certain IDS strategy as it operates on the darknet IP space. The implications of this formal derivation are especially factual with the advent of evolving paradigms such as IPv6 deployments, and the proliferation of highly-distributed, orchestrated, large-scale and stealthy probing botnets.
引用
收藏
页码:111 / 121
页数:11
相关论文
共 22 条
  • [1] Deep in the Dark: A Novel Threat Detection System using Darknet Traffic
    Kumar, Sanjay
    Vranken, Harald
    van Dijk, Joost
    Hamalainen, Timo
    2019 IEEE INTERNATIONAL CONFERENCE ON BIG DATA (BIG DATA), 2019, : 4273 - 4279
  • [2] Ensemble Voting for Enhanced Robustness in DarkNet Traffic Detection
    Shinde, Varun
    Singhal, Kartik
    Almogren, Ahmad
    Dhanawat, Vineet
    Karande, Vishal
    Rehman, Ateeq Ur
    IEEE ACCESS, 2024, 12 : 177064 - 177079
  • [3] Implications of Theoretic Derivations on Empirical Passive Measurements for Effective Cyber Threat Intelligence Generation
    Pour, Morteza Safaei
    Bou-Harb, Elias
    2018 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2018,
  • [4] DarkMor: A framework for darknet traffic detection that integrates local and spatial features
    Yang, Jin
    Liang, Weiheng
    Wang, Xin
    Li, Siyu
    Jiang, Xinyun
    Mu, Yufei
    Zeng, Shunyang
    NEUROCOMPUTING, 2024, 607
  • [5] Deep Neural Classification of Darknet Traffic
    Alimoradi, Mahmoud
    Zabihimayvan, Mahdieh
    Daliri, Arman
    Sledzik, Ryan
    Sadeghi, Reza
    ARTIFICIAL INTELLIGENCE RESEARCH AND DEVELOPMENT, 2022, 356 : 105 - 114
  • [6] Darknet Traffic Analysis: A Systematic Literature Review
    Saleem, Javeriah
    Islam, Rafiqul
    Islam, Md. Zahidul
    IEEE ACCESS, 2024, 12 : 42423 - 42452
  • [7] DarkDetect: Darknet Traffic Detection and Categorization Using Modified Convolution-Long Short-Term Memory
    Sarwar, Muhammad Bilal
    Hanif, Muhammad Kashif
    Talib, Ramzan
    Younas, Muhammad
    Sarwar, Muhammad Umer
    IEEE ACCESS, 2021, 9 : 113705 - 113713
  • [8] Malicious Events Grouping via Behavior Based Darknet Traffic Flow Analysis
    Pang, Shaoning
    Komosny, Dan
    Zhu, Lei
    Zhang, Ruibin
    Sarrafzadeh, Abdolhossein
    Ban, Tao
    Inoue, Daisuke
    WIRELESS PERSONAL COMMUNICATIONS, 2017, 96 (04) : 5335 - 5353
  • [9] Malicious Events Grouping via Behavior Based Darknet Traffic Flow Analysis
    Shaoning Pang
    Dan Komosny
    Lei Zhu
    Ruibin Zhang
    Abdolhossein Sarrafzadeh
    Tao Ban
    Daisuke Inoue
    Wireless Personal Communications, 2017, 96 : 5335 - 5353
  • [10] Analyzing Darknet Traffic Through Machine Learning and Neucube Spiking Neural Networks
    Akour, Iman
    Alauthman, Mohammad
    Nahar, Khalid M. O.
    Almomani, Ammar
    Gupta, Brij B.
    Intelligent and Converged Networks, 2024, 5 (04): : 265 - 283