• DocumentCode
    717040
  • Title

    Unveiling flat traffic on the Internet: An SSH attack case study

  • Author

    Jonker, Mattijs ; Hofstede, Rick ; Sperotto, Anna ; Pras, Aiko

  • Author_Institution
    Centre for Telematics & Inf. Technol. (CTIT), Univ. of Twente, Enschede, Netherlands
  • fYear
    2015
  • fDate
    11-15 May 2015
  • Firstpage
    270
  • Lastpage
    278
  • Abstract
    Many types of brute-force attacks are known to exhibit a characteristic `flat´ behavior at the network-level, meaning that connections belonging to an attack feature a similar number of packets and bytes, and duration. Flat traffic usually results from repeating similar application-layer actions, such as login attempts in a brute-force attack. For typical attacks, hundreds of attempts span over multiple connections, with each connection containing the same, small number of attempts. The characteristic flat behavior is used by many Intrusion Detection Systems (IDSes), both for identifying the presence of attacks and - once detected - for observing deviations, pointing out potential compromises, for example. However, flatness of network traffic may become indistinct when TCP retransmissions and control information come into play. These TCP phenomena affect not only intrusion detection, but also other forms of network traffic analysis. The contribution of this work is twofold. First, we analyze the impact of retransmissions and control information on network traffic based on traffic measurements. To do so, we have developed a flow exporter extension that was deployed in both a campus and a backbone network. Second, we show that intrusion detection results improve dramatically by up to 16 percentage points once IDSes are able to `flatten´ network traffic again, which we have validated by means of analyzing log files of almost 60 hosts over a period of one month.
  • Keywords
    Internet; computer network security; security of data; IDSes; Internet; SSH attack; TCP retransmissions; application layer actions; backbone network; brute force attacks; campus network; flat traffic; flow exporter extension; intrusion detection; intrusion detection systems; network traffic; network traffic analysis; typical attacks; Delays; Dictionaries; Internet; Intrusion detection; Monitoring; Payloads; Probes;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Integrated Network Management (IM), 2015 IFIP/IEEE International Symposium on
  • Conference_Location
    Ottawa, ON
  • Type

    conf

  • DOI
    10.1109/INM.2015.7140301
  • Filename
    7140301