Skip to main content

2017 | OriginalPaper | Buchkapitel

A Profile-Based Fast Port Scan Detection Method

verfasst von : Katalin Hajdú-Szücs, Sándor Laki, Attila Kiss

Erschienen in: Computational Collective Intelligence

Verlag: Springer International Publishing

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Before intruding into a system attackers need to collect information about the target machine. Port scanning is one of the most popular techniques for that purpose, it enables to discover services that may be exploited. In this paper we propose an accurate port scan detection method that can detect port scanning attacks earlier with higher reliability than the widely used Snort-based approaches. Our method is profile-based, meaning that it does not only set a threshold on the connection attempts in a given time interval, like most of the current methods, but builds an IP profile of four features that enables a more fine-grained detection. We use the Budapest node of the FIWARE Lab community cloud as a natural honeypot to identify malicious activities in it.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
3.
Zurück zum Zitat Ahanger, T.A.: Port scan - a security concern. Int. J. Eng. Innovative Technol. (IJEIT) 3 (2014) Ahanger, T.A.: Port scan - a security concern. Int. J. Eng. Innovative Technol. (IJEIT) 3 (2014)
5.
Zurück zum Zitat Bhuyan, M.H., Bhattacharyya, D.K., Kalita, J.K.: Surveying port scans and their detection methodologies. Comput. J. 54, 1565–1581 (2011)CrossRef Bhuyan, M.H., Bhattacharyya, D.K., Kalita, J.K.: Surveying port scans and their detection methodologies. Comput. J. 54, 1565–1581 (2011)CrossRef
6.
Zurück zum Zitat Christopher, R.: Port Scanning Techniques and the Defense Against Them. SANS Institute (2001) Christopher, R.: Port Scanning Techniques and the Defense Against Them. SANS Institute (2001)
8.
Zurück zum Zitat Jaekwang, K., Lee, J.-H.: A slow port scan attack detection mechanism based on fuzzy logic and a stepwise policy. In: 4th International Conference on Intelligent Environments, IET (2008) Jaekwang, K., Lee, J.-H.: A slow port scan attack detection mechanism based on fuzzy logic and a stepwise policy. In: 4th International Conference on Intelligent Environments, IET (2008)
9.
Zurück zum Zitat Kumar, V., Sangwan, O.P.: Signature based intrusion detection system using snort. Int. J. Comput. Appl. Inf. Technol. 1(3), 35–41 (2012). (ISSN: 2278-7720) Kumar, V., Sangwan, O.P.: Signature based intrusion detection system using snort. Int. J. Comput. Appl. Inf. Technol. 1(3), 35–41 (2012). (ISSN: 2278-7720)
10.
Zurück zum Zitat Lee, C.B., Roedel, C., Silenok, E.: Detection and characterization of port scan attacks. Univeristy of California, Department of Computer Science and Engineering (2003) Lee, C.B., Roedel, C., Silenok, E.: Detection and characterization of port scan attacks. Univeristy of California, Department of Computer Science and Engineering (2003)
11.
Zurück zum Zitat Maciej, K., Janowski, L., Duda, A.: An accurate sampling scheme for detecting SYN flooding attacks and portscans. In: International Conference on Communications (ICC). IEEE (2011) Maciej, K., Janowski, L., Duda, A.: An accurate sampling scheme for detecting SYN flooding attacks and portscans. In: International Conference on Communications (ICC). IEEE (2011)
13.
Zurück zum Zitat Omar, A.-J., Arafat, A.: Network intrusion detection system using neural network classification of attack behavior. J. Adv. Inf. Technol. 6(1) (2015) Omar, A.-J., Arafat, A.: Network intrusion detection system using neural network classification of attack behavior. J. Adv. Inf. Technol. 6(1) (2015)
14.
Zurück zum Zitat Panjwani, S., et al.: An experimental evaluation to determine if port scans are precursors to an attack. In: Proceedings of the International Conference on Dependable Systems and Networks, pp. 602–611. IEEE (2005) Panjwani, S., et al.: An experimental evaluation to determine if port scans are precursors to an attack. In: Proceedings of the International Conference on Dependable Systems and Networks, pp. 602–611. IEEE (2005)
15.
Zurück zum Zitat Patel, S.K., Sonker, A.: Rule-based network intrusion detection system for port scanning with efficient port scan detection rules using snort. Int. J. Future Gener. Commun. Netw. 9(6), 339–350 (2016)CrossRef Patel, S.K., Sonker, A.: Rule-based network intrusion detection system for port scanning with efficient port scan detection rules using snort. Int. J. Future Gener. Commun. Netw. 9(6), 339–350 (2016)CrossRef
16.
Zurück zum Zitat Soniya, B., Wiscy, M.: Detection of TCP SYN scanning using packet counts and neural network. IEEE International Conference on Signal Image Technology and Internet Based Systems SITIS 2008. IEEE (2008) Soniya, B., Wiscy, M.: Detection of TCP SYN scanning using packet counts and neural network. IEEE International Conference on Signal Image Technology and Internet Based Systems SITIS 2008. IEEE (2008)
17.
Zurück zum Zitat Stuart, S., Hoagland, J.A., McAlerney, J.M.: Practical automated detection of stealthy portscans. J. Comput. Secur. 10(1–2), 105–136 (2002) Stuart, S., Hoagland, J.A., McAlerney, J.M.: Practical automated detection of stealthy portscans. J. Comput. Secur. 10(1–2), 105–136 (2002)
18.
Zurück zum Zitat Stuart, S.-C., et al.: Grids-a graph based intrusion detection system for large networks. In: Proceedings of the 19th National Information Systems Security Conference, vol. 1 (1996) Stuart, S.-C., et al.: Grids-a graph based intrusion detection system for large networks. In: Proceedings of the 19th National Information Systems Security Conference, vol. 1 (1996)
19.
Zurück zum Zitat Todd, H.L., et al.: A network security monitor. In: Computer Society Symposium, Proceedings. IEEE (1990) Todd, H.L., et al.: A network security monitor. In: Computer Society Symposium, Proceedings. IEEE (1990)
21.
Zurück zum Zitat Jammes, Z., Papadaki, M.: Snort IDS ability to detect Nmap and metasploit framework evasion techniques. Adv. Commun. Comput. Netw. Secur. 10, 104 (2013) Jammes, Z., Papadaki, M.: Snort IDS ability to detect Nmap and metasploit framework evasion techniques. Adv. Commun. Comput. Netw. Secur. 10, 104 (2013)
Metadaten
Titel
A Profile-Based Fast Port Scan Detection Method
verfasst von
Katalin Hajdú-Szücs
Sándor Laki
Attila Kiss
Copyright-Jahr
2017
DOI
https://doi.org/10.1007/978-3-319-67074-4_39