DocumentCode
3393485
Title
Network surveillance for detecting intrusions
Author
Iguchi, Makoto ; Goto, Shigeki
Author_Institution
Sch. of Sci. & Eng., Waseda Univ., Tokyo, Japan
fYear
1999
fDate
1999
Firstpage
99
Lastpage
106
Abstract
The paper proposes a network surveillance method for detecting malicious activities. Based on the hypothesis that unusual conducts like system exploitation will trigger an abnormal network traffic, we try to detect this anomalous traffic pattern as a sign of malicious, or at least suspicious activities. Capturing and analyzing of a network traffic pattern is implemented with an idea of port profiling, where measures representing various characteristics of connections are monitored and recorded for each port. Though the generation of the port profiles requires a small amount of calculation, they exhibit high stability and robustness. By comparing the pattern exhibited by live traffic with the expected behavior recorded in the profile, intrusive activities like compromising backdoors or invoking trojan programs are successfully detected
Keywords
Internet; security of data; surveillance; telecommunication security; telecommunication traffic recording; abnormal network traffic; anomalous traffic pattern; compromising backdoors; expected behavior; intrusion detection; intrusive activities; live traffic; malicious activities; network surveillance method; network traffic pattern; port profiling; suspicious activities; system exploitation; trojan programs; unusual conducts; Computer networks; Filtering; Intrusion detection; Monitoring; Pattern analysis; Protocols; Robust stability; Surveillance; TCPIP; Telecommunication traffic;
fLanguage
English
Publisher
ieee
Conference_Titel
Internet Workshop, 1999. IWS 99
Conference_Location
Osaka
Print_ISBN
0-7803-5925-9
Type
conf
DOI
10.1109/IWS.1999.810999
Filename
810999
Link To Document