Detecting probes and scans over high-bandwidth, long-term, incomplete network traffic information using limited memory

作者: Salvatore J. Stolfo , Seth Jerome Robertson

DOI:

关键词:

摘要: A method for detecting surveillance activity in a computer communication network comprising automatic detection of malicious probes and scans adaptive learning. Automatic scan/probe turn comprises modeling connections, connections that are likely originating from sources, scanning by grouping source addresses logically close to one another recognizing certain combinations probes. The is implemented detector, preferably combination with commercial or open-source intrusion system an anomaly detector. Once generated, the model monitors online detect behavior without any requirement priori knowledge behavior. This referred as “behavior-based” “mining-based detection.” three main components may be used separately each other. alerts produced presented analyst, generating reports (such trend analysis), correlated other detectors. Through correlation, invention prioritizes alerts, reduces number determines most important alerts.

参考文章(19)
William Tarkington, Yuan Jiang, Jeff Oliveto, Anish Desai, Multi-level and multi-platform intrusion detection and response system ,(2002)
Aaron Schwartzbard, Michael Schatz, Christoph C. Michael, Anup K. Ghosh, Computer intrusion detection system and method based on application monitoring ,(2000)
Robert E. Gleichauf, Scott V. Waddell, Daniel M. Teal, Kevin J. Ziese, William A. Randall, Method and system for adaptive network security using network vulnerability assessment ,(1998)
Paul Kierstead, Scott David D'Souza, Jean-Marc Robert, Brett Howard, Statistical methods for detecting TCP SYN flood attacks ,(2002)
Utpal Datta, Glenn Spargo, Lundy Lewis, Method and apparatus for surveillance in communications networks ,(1998)