DocumentCode :
3100745
Title :
Characterizing Transition Behaviors in Internet Attack Sequences
Author :
Du, Haitao ; Yang, Shanchieh Jay
Author_Institution :
Dept. of Comput. Eng., Rochester Inst. of Technol., Rochester, NY, USA
fYear :
2011
fDate :
July 31 2011-Aug. 4 2011
Firstpage :
1
Lastpage :
6
Abstract :
Cyber attacks from the Internet often span over multiple ports and multiple hosts. This work hypothesizes that there are distinct sequential patterns revealing hacking behavior. A feature called Attack Transition Action (ATA) is defined to represent the changes on attacked destinations and ports over time. The simplicity of the feature enables the development of a probabilistic model, revealing higher order transitions hidden within the attack sequences. The model trained with a real-world attack dataset uncovers several natural clusters of Internet attack behaviors. The discovered behavior patterns are explained with representative hacking strategies. Our systematic modeling and analysis provides an effective means to characterize classes of Internet attacks.
Keywords :
Internet; computer crime; computer network security; probability; Cyber attacks; Internet; attack sequences; attack transition action; hacking strategy; natural clusters; probabilistic model; Complexity theory; Computer crime; Computer hacking; IP networks; Internet; Markov processes; Training;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Computer Communications and Networks (ICCCN), 2011 Proceedings of 20th International Conference on
Conference_Location :
Maui, HI
ISSN :
1095-2055
Print_ISBN :
978-1-4577-0637-0
Type :
conf
DOI :
10.1109/ICCCN.2011.6006017
Filename :
6006017
Link To Document :
بازگشت