Skip to main content

2018 | OriginalPaper | Buchkapitel

Characterizing Network Flows for Detecting DNS, NTP, and SNMP Anomalies

verfasst von : Rohini Sharma, Ajay Guleria, R. K. Singla

Erschienen in: Intelligent Computing and Information and Communication

Verlag: Springer Singapore

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Network security can never be assured fully as new attacks are reported every day. Characterizing such new attacks is a challenging task. For detecting anomalies based on specific services, it is desirable to find characteristic features for those service specific anomalies. In this paper, real-time flow-based network traffic captured from a university campus is studied to find if the traditional volume-based analysis of aggregated flows and service specific aggregated flows is useful in detecting service specific anomalies or not. Two existing techniques are also evaluated to find characteristic features of these anomalies. The service specific anomalies: DNS, NTP, and SNMP are considered for study in this paper.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Sperotto, A., Sadre, R., Pras, A.: Anomaly characterization in flow-based traffic time series. In: International Workshop on IP Operations and Management, pp. 15–27. Springer, Heidelberg. (2008). Sperotto, A., Sadre, R., Pras, A.: Anomaly characterization in flow-based traffic time series. In: International Workshop on IP Operations and Management, pp. 15–27. Springer, Heidelberg. (2008).
2.
Zurück zum Zitat Sperotto, A., Pras, A.: Flow-based intrusion detection. In: IFIP/IEEE International Symposium on Integrated Network Management (IM), pp. 958–963. (2011). Sperotto, A., Pras, A.: Flow-based intrusion detection. In: IFIP/IEEE International Symposium on Integrated Network Management (IM), pp. 958–963. (2011).
3.
Zurück zum Zitat Fernandes, G., Rodrigues, J. J., Proena, M. L.: Autonomous profile-based anomaly detection system using principal component analysis and flow analysis. Applied Soft Computing, 34, 513–525. (2015). Fernandes, G., Rodrigues, J. J., Proena, M. L.: Autonomous profile-based anomaly detection system using principal component analysis and flow analysis. Applied Soft Computing, 34, 513–525. (2015).
4.
Zurück zum Zitat Ellens, W., Żuraniewski, P., Sperotto, A., Schotanus, H., Mandjes, M., Meeuwissen, E.: Flow based detection of DNS tunnels. In: IFIP International Conference on Autonomous Infrastructure, Management and Security, pp. 124–135. Springer, Heidelberg. (2013). Ellens, W., Żuraniewski, P., Sperotto, A., Schotanus, H., Mandjes, M., Meeuwissen, E.: Flow based detection of DNS tunnels. In: IFIP International Conference on Autonomous Infrastructure, Management and Security, pp. 124–135. Springer, Heidelberg. (2013).
5.
Zurück zum Zitat Johnson, T., Lazos, L.: Network anomaly detection using autonomous system flow aggregates. In: IEEE Global Communications Conference (GLOBECOM), pp. 544–550. (2014). Johnson, T., Lazos, L.: Network anomaly detection using autonomous system flow aggregates. In: IEEE Global Communications Conference (GLOBECOM), pp. 544–550. (2014).
6.
Zurück zum Zitat Pena, E. H., Barbon, S., Rodrigues, J. J., Proena, M. L.: Anomaly detection using digital signature of network segment with adaptive ARIMA model and Paraconsistent Logic. In: IEEE Symposium on Computers and Communication (ISCC), pp. 1–6. (2014). Pena, E. H., Barbon, S., Rodrigues, J. J., Proena, M. L.: Anomaly detection using digital signature of network segment with adaptive ARIMA model and Paraconsistent Logic. In: IEEE Symposium on Computers and Communication (ISCC), pp. 1–6. (2014).
7.
Zurück zum Zitat Carvalho, L. F., Rodrigues, J. J., Barbon, S., Proenca, M. L.: Using ant colony optimization metaheuristic and dynamic time warping for anomaly detection. In: International Conference on Software, Telecommunications and Computer Networks (SoftCOM), pp. 1–5. (2017). Carvalho, L. F., Rodrigues, J. J., Barbon, S., Proenca, M. L.: Using ant colony optimization metaheuristic and dynamic time warping for anomaly detection. In: International Conference on Software, Telecommunications and Computer Networks (SoftCOM), pp. 1–5. (2017).
8.
Zurück zum Zitat Li, Y., Luo, X., Li, B.: Detecting network-wide traffic anomalies based on robust multivariate probabilistic calibration model. In: IEEE Military Communications Conference, MILCOM, pp. 1323–1328. (2015). Li, Y., Luo, X., Li, B.: Detecting network-wide traffic anomalies based on robust multivariate probabilistic calibration model. In: IEEE Military Communications Conference, MILCOM, pp. 1323–1328. (2015).
9.
Zurück zum Zitat Hellemons, L., Hendriks, L., Hofstede, R., Sperotto, A., Sadre, R., Pras, A.: SSHCure: a flowbased SSH intrusion detection system. In: IFIP International Conference on Autonomous Infrastructure, Management and Security, pp. 86–97. Springer, Heidelberg. (2012). Hellemons, L., Hendriks, L., Hofstede, R., Sperotto, A., Sadre, R., Pras, A.: SSHCure: a flowbased SSH intrusion detection system. In: IFIP International Conference on Autonomous Infrastructure, Management and Security, pp. 86–97. Springer, Heidelberg. (2012).
11.
Zurück zum Zitat Huistra, D.: Detecting reflection attacks in DNS flows. In: 19th Twente Student Conference on IT. (2013). Huistra, D.: Detecting reflection attacks in DNS flows. In: 19th Twente Student Conference on IT. (2013).
12.
Zurück zum Zitat Karasaridis, A., Meier-Hellstern, K., Hoeflin, D.: Nis04-2: Detection of dns anomalies using flow data analysis. In: IEEE Global Telecommunications Conference, GLOBECOM’06, pp. 1–6. (2006). Karasaridis, A., Meier-Hellstern, K., Hoeflin, D.: Nis04-2: Detection of dns anomalies using flow data analysis. In: IEEE Global Telecommunications Conference, GLOBECOM’06, pp. 1–6. (2006).
Metadaten
Titel
Characterizing Network Flows for Detecting DNS, NTP, and SNMP Anomalies
verfasst von
Rohini Sharma
Ajay Guleria
R. K. Singla
Copyright-Jahr
2018
Verlag
Springer Singapore
DOI
https://doi.org/10.1007/978-981-10-7245-1_33

Premium Partner