• DocumentCode
    2299748
  • Title

    Characterising the Evolution in Scanning Activity of Suspicious Hosts

  • Author

    Wahid, Alif ; Leckie, Christopher ; Zhou, Chenfeng

  • Author_Institution
    Dept. of Comput. Sci. & Software Eng., Univ. of Melbourne, Melbourne, VIC, Australia
  • fYear
    2009
  • fDate
    19-21 Oct. 2009
  • Firstpage
    344
  • Lastpage
    350
  • Abstract
    The early detection of multistage attacks like DDoS and coordinated spamming poses a major challenge for existing counter-measures based on reactive blacklists. One approach to addressing this challenge would be to profile hosts that engage in scanning activity and predict their future actions. However, this requires understanding how hosts evolve their scanning behaviour. In order to address this issue we have analysed logs from the DShield repository of globally distributed IDS alerts corresponding to the first 15 days of January 2005. We first clustered hosts using similarities in the spatial breadth (targeted DShield subscribers) and depth (targeted destination ports) of their scanning activity during aggregation intervals of one day at a time. We then analysed temporal properties like popularity, volatility, lifetime and transition of these clusters to infer how they evolved over time. We found persistent clusters with stable sizes. However, they were highly volatile with a consistent turn-over of hosts everyday. This was caused by the lifetime of hosts in each cluster mostly being one day. Nevertheless, we came across a non-trivial number of hosts that appeared everyday while belonging to the same cluster or transitioning from one cluster to another. Based on these findings, it is plausible that suspicious hosts can be profiled for long periods of time to predict an imminent multistage attack.
  • Keywords
    Internet; security of data; telecommunication security; DShield repository; Internet; aggregation interval; distributed IDS; evolution characterisation; imminent multistage attack detection; stable size; suspicious host scanning activity; temporal property; Aggregates; Computer science; Computer security; Computerized monitoring; Internet; Intrusion detection; Recruitment; Size measurement; Software engineering; Spatiotemporal phenomena;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Network and System Security, 2009. NSS '09. Third International Conference on
  • Conference_Location
    Gold Coast, QLD
  • Print_ISBN
    978-1-4244-5087-9
  • Electronic_ISBN
    978-0-7695-3838-9
  • Type

    conf

  • DOI
    10.1109/NSS.2009.13
  • Filename
    5319276