DocumentCode :
135494
Title :
Characterization of worm attacks using entropy, Mahalanobis distance and K-nearest neighbors
Author :
Santiago-Paz, Jayro ; Torres-Roman, D.
Author_Institution :
Dept. of Electr. Eng. & Comput. Sci. Telecommun., CINVESTAV IPN, Guadalajara, Mexico
fYear :
2014
fDate :
26-28 Feb. 2014
Firstpage :
200
Lastpage :
205
Abstract :
This paper presents an algorithm based on entropy and Mahalanobis distance to characterize the behavior of worms attack. For this, is built a matrix with estimates of entropy of different intrinsic features of the network traffic, of this matrix four parameters {μ, γ, λ, d2} are obtained. These values determine an ellipsoidal region that characterizes the behavior of the worm within the space defined by the traffic features. Tests were conducted with two types of traces, one obtained from a LAN network traffic containing real attacks Blaster, Sasser and Welchia, and the other one is a Smurf attack obtained from the MIT-DARPA dataset. Using K nearest neighbors in time was performed a classification of the slots that were outside the ellipsoidal regions defined previously.
Keywords :
entropy; invasive software; pattern classification; Blaster; K nearest neighbors; K-nearest neighbors; LAN network traffic; MIT-DARPA dataset; Mahalanobis distance; Sasser; Smurf attack; Welchia; entropy; worm attack characterization; Covariance matrices; Entropy; Grippers; IP networks; Measurement; Ports (Computers); Vectors;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Electronics, Communications and Computers (CONIELECOMP), 2014 International Conference on
Conference_Location :
Cholula
Print_ISBN :
978-1-4799-3468-3
Type :
conf
DOI :
10.1109/CONIELECOMP.2014.6808591
Filename :
6808591
Link To Document :
بازگشت