DocumentCode :
717040
Title :
Unveiling flat traffic on the Internet: An SSH attack case study
Author :
Jonker, Mattijs ; Hofstede, Rick ; Sperotto, Anna ; Pras, Aiko
Author_Institution :
Centre for Telematics & Inf. Technol. (CTIT), Univ. of Twente, Enschede, Netherlands
fYear :
2015
fDate :
11-15 May 2015
Firstpage :
270
Lastpage :
278
Abstract :
Many types of brute-force attacks are known to exhibit a characteristic `flat´ behavior at the network-level, meaning that connections belonging to an attack feature a similar number of packets and bytes, and duration. Flat traffic usually results from repeating similar application-layer actions, such as login attempts in a brute-force attack. For typical attacks, hundreds of attempts span over multiple connections, with each connection containing the same, small number of attempts. The characteristic flat behavior is used by many Intrusion Detection Systems (IDSes), both for identifying the presence of attacks and - once detected - for observing deviations, pointing out potential compromises, for example. However, flatness of network traffic may become indistinct when TCP retransmissions and control information come into play. These TCP phenomena affect not only intrusion detection, but also other forms of network traffic analysis. The contribution of this work is twofold. First, we analyze the impact of retransmissions and control information on network traffic based on traffic measurements. To do so, we have developed a flow exporter extension that was deployed in both a campus and a backbone network. Second, we show that intrusion detection results improve dramatically by up to 16 percentage points once IDSes are able to `flatten´ network traffic again, which we have validated by means of analyzing log files of almost 60 hosts over a period of one month.
Keywords :
Internet; computer network security; security of data; IDSes; Internet; SSH attack; TCP retransmissions; application layer actions; backbone network; brute force attacks; campus network; flat traffic; flow exporter extension; intrusion detection; intrusion detection systems; network traffic; network traffic analysis; typical attacks; Delays; Dictionaries; Internet; Intrusion detection; Monitoring; Payloads; Probes;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Integrated Network Management (IM), 2015 IFIP/IEEE International Symposium on
Conference_Location :
Ottawa, ON
Type :
conf
DOI :
10.1109/INM.2015.7140301
Filename :
7140301
Link To Document :
بازگشت