Abstract
In this paper, information theory and data mining techniques to extract knowledge of network traffic behavior for packet-level and flow-level are proposed, which can be applied for traffic profiling in intrusion detection systems. The empirical analysis of our profiles through the rate of remaining features at the packet-level, as well as the three-dimensional spaces of entropy at the flow-level, provide a fast detection of intrusions caused by port scanning and worm attacks.
Highlights
Network Intrusion Detection Systems [1], or NIDSs, have become an important component to detecting attacks against information systems
A weakness of this type of NIDS is that there will always be a lag between a new threat being discovered and the signature for detecting that threat being applied to the NIDS
This paper presents an analysis at the packet and the flow level on traces obtained through measurements conducted in a campus network under real attacks of the Blaster [6] and Sasser [7] worms, as well as a port scan attack to the proxy server of that network
Summary
Network Intrusion Detection Systems [1], or NIDSs, have become an important component to detecting attacks against information systems. Traditional anomaly based IDSs, employ algorithms that focus primarily on changes in the traffic volume at specific points on the network, and promptly alert the operator of a sudden increase. Such systems can be evaded through sophisticated attacks that focus on compromising significant hosts, causing them a collapse of memory or CPU. A new generation of anomaly based IDSs have emerged, which focus on gaining knowledge in the structure and composition of the traffic and not just its volume Such systems are based on the fact that the malicious activities affect the natural randomness of the network, e.g., they change significantly the entropy of the network [4] [5].
Published Version (Free)
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have