• DocumentCode
    175408
  • Title

    Filtering Automated Polling Traffic in Computer Network Flow Data

  • Author

    Heard, Nick ; Rubin-Delanchy, Patrick ; Lawson, Daniel

  • Author_Institution
    Imperial Coll. London, London, UK
  • fYear
    2014
  • fDate
    24-26 Sept. 2014
  • Firstpage
    268
  • Lastpage
    271
  • Abstract
    Detecting polling behaviour in a computer network has two important applications. First, the polling can be indicative of malware beaconing, where an undetected software virus sends regular communications to a controller. Second, the cause of the polling may not be malicious, since it may correspond to regular automated update requests permitted by the client, to build models of normal host behaviour for signature-free anomaly detection, this polling behaviour needs to be understood. This article presents a simple Fourier analysis technique for identifying regular polling, and focuses on the second application: modelling the normal behaviour of a host, using real data collected from the computer network of Imperial College London.
  • Keywords
    Fourier analysis; computer network security; system monitoring; Fourier analysis technique; Imperial College London; automated polling traffic filtering; computer network flow data; regular automated update requests; signature-free anomaly detection; Computational modeling; Educational institutions; IP networks; Malware; Monitoring; Servers;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Intelligence and Security Informatics Conference (JISIC), 2014 IEEE Joint
  • Conference_Location
    The Hague
  • Print_ISBN
    978-1-4799-6363-8
  • Type

    conf

  • DOI
    10.1109/JISIC.2014.52
  • Filename
    6975589