Skip to main content
Erschienen in: Annals of Telecommunications 7-8/2014

01.08.2014

Cheetah: a space-efficient HNB-based NFAT approach to supporting network forensics

verfasst von: Bo-Chao Cheng, Guo-Tan Liao, Hsu-Chen Huang, Ping-Hai Hsu

Erschienen in: Annals of Telecommunications | Ausgabe 7-8/2014

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

The popularity of the Internet has increased the ease of online access to malicious software, and the amount of software designed to perform denial-of-service (DoS) attacks is incalculable. This enables hackers to use online resources to easily launch attacks, posing serious threats to network security. The ultimate solution to increasingly severe DoS attacks is to identify the sources of the attacks; this is known as an IP traceback or forensics. However, the Network Forensic Analysis Tool is limited by the storage space, which significantly reduces the effects of the traceback. We proposed a Cheetah mechanism, which was proposed to overcome the disadvantage of requiring a significant data storage requirement. This involved using mechanic learning to filter irrelevant data, thereby retaining only the evidence related to DoS attacks to perform subsequent tracebacks. The experiment results confirmed that the proposed mechanism can reduce the quantity of data that requires storage and maintain a certain level of forensic accuracy.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Cheng B-C, Chen H, Tseng R-Y (2010) Quality assurance evidence collection model for MSN forensics. J Intell Manuf 21(5):613–622CrossRef Cheng B-C, Chen H, Tseng R-Y (2010) Quality assurance evidence collection model for MSN forensics. J Intell Manuf 21(5):613–622CrossRef
2.
Zurück zum Zitat Snoeren AC, Partridge C, Sanchez LA, Jones CE (2001) Hash-Based IP Traceback. SIGCOMM-’01, pp. 27–31 Snoeren AC, Partridge C, Sanchez LA, Jones CE (2001) Hash-Based IP Traceback. SIGCOMM-’01, pp. 27–31
3.
Zurück zum Zitat Bellovin S (2003) ICMP Traceback Messages. Internet Draft: draft-ietf-itrace-04.txt Bellovin S (2003) ICMP Traceback Messages. Internet Draft: draft-ietf-itrace-04.txt
4.
Zurück zum Zitat Savage S, Wetherall D, Karlin A, Anderson T (2000) Practical network support for IP traceback. ACM SIGCOMM Comput Commun Rev 30(4):295–306CrossRef Savage S, Wetherall D, Karlin A, Anderson T (2000) Practical network support for IP traceback. ACM SIGCOMM Comput Commun Rev 30(4):295–306CrossRef
5.
Zurück zum Zitat Hunt R, Zeadally S (2012) Network forensics: an analysis of techniques, tools, and trends. IEEE Comput 45(12):36–43CrossRef Hunt R, Zeadally S (2012) Network forensics: an analysis of techniques, tools, and trends. IEEE Comput 45(12):36–43CrossRef
6.
Zurück zum Zitat Kang S, Reddy AL (2006) An approach to virtual allocation in storage systems. ACM Trans Storage 2(4):371–399CrossRef Kang S, Reddy AL (2006) An approach to virtual allocation in storage systems. ACM Trans Storage 2(4):371–399CrossRef
8.
9.
Zurück zum Zitat Pan D (1995) A tutorial on MPEG/audio compression. IEEE Multimed 2(2):60–74CrossRef Pan D (1995) A tutorial on MPEG/audio compression. IEEE Multimed 2(2):60–74CrossRef
10.
Zurück zum Zitat Geer D (2008) Reducing the storage burden via data deduplication. Computer 41(12):15–17CrossRef Geer D (2008) Reducing the storage burden via data deduplication. Computer 41(12):15–17CrossRef
11.
Zurück zum Zitat Namey E, Guest G, Thairu L, Johnson L (2008) Data reduction techniques for large qualitative datasets. In: Guest G, MacQueen K (eds) Handbook for Team-Based Qualitative Research. Altamira, Lanham, pp 137–161 Namey E, Guest G, Thairu L, Johnson L (2008) Data reduction techniques for large qualitative datasets. In: Guest G, MacQueen K (eds) Handbook for Team-Based Qualitative Research. Altamira, Lanham, pp 137–161
12.
Zurück zum Zitat Boyatzis RE (1998) Transforming Qualitative Information: Thematic Analysis and Code Development. Sage Publications, Thousand Oaks, CA Boyatzis RE (1998) Transforming Qualitative Information: Thematic Analysis and Code Development. Sage Publications, Thousand Oaks, CA
13.
Zurück zum Zitat Braun V, Clarke V (2006) Using thematic analysis in psychology. Qual Res Psychol 3(2):77–101CrossRef Braun V, Clarke V (2006) Using thematic analysis in psychology. Qual Res Psychol 3(2):77–101CrossRef
14.
Zurück zum Zitat Stone R (2000) CenterTrack: An IP Overlay Network for Tracking DoSFloods. The 9-th USENIX Security Symposium, pp. 199–212 Stone R (2000) CenterTrack: An IP Overlay Network for Tracking DoSFloods. The 9-th USENIX Security Symposium, pp. 199–212
15.
Zurück zum Zitat Burch H, Cheswick B (2000) Tracing Anonymous Packets to Their Approximate Source. The 14-th USENIX Conference on Systems Administration, pp. 319–328 Burch H, Cheswick B (2000) Tracing Anonymous Packets to Their Approximate Source. The 14-th USENIX Conference on Systems Administration, pp. 319–328
16.
Zurück zum Zitat Chen Y, Hwang K (2007) TCP Flow Analysis for Defense against Shrew DDoS Attacks. IEEE International Conference on, Communications Chen Y, Hwang K (2007) TCP Flow Analysis for Defense against Shrew DDoS Attacks. IEEE International Conference on, Communications
17.
Zurück zum Zitat Jiang L, Zhang H, Cai Z (2009) A novel Bayes model: hidden naive Bayes. IEEE Trans Knowl Data Eng 21(10):1361–1371CrossRef Jiang L, Zhang H, Cai Z (2009) A novel Bayes model: hidden naive Bayes. IEEE Trans Knowl Data Eng 21(10):1361–1371CrossRef
18.
Zurück zum Zitat Freeman JA, Skapura DM (1991) Neural Networks Algorithms Applications and Programming Techniques. Addison-Wesley, Reading, MichiganMATH Freeman JA, Skapura DM (1991) Neural Networks Algorithms Applications and Programming Techniques. Addison-Wesley, Reading, MichiganMATH
19.
Zurück zum Zitat Chickering DM (1996) Learning Bayesian Networks is NP-Complete. Springer-Verlag, in Fisher, D. and Lenz, H., editors, Learning from Data: Artificial Intelligence and Statistics V, pp. 121–130 Chickering DM (1996) Learning Bayesian Networks is NP-Complete. Springer-Verlag, in Fisher, D. and Lenz, H., editors, Learning from Data: Artificial Intelligence and Statistics V, pp. 121–130
20.
Zurück zum Zitat Friedman N, Geiger D, Goldszmidt M (1997) Bayesian network classifiers. Mach Learn 29:131–163CrossRefMATH Friedman N, Geiger D, Goldszmidt M (1997) Bayesian network classifiers. Mach Learn 29:131–163CrossRefMATH
21.
Zurück zum Zitat Chen LM, Chen MC, Sun YS, Hsiao SW, Sekar V, Zhang H (2009) Scalable Long-term Network Forensics for Epidemic Attacks. International Conference on Network and Service Security (N2S '09), pp. 1–6 Chen LM, Chen MC, Sun YS, Hsiao SW, Sekar V, Zhang H (2009) Scalable Long-term Network Forensics for Epidemic Attacks. International Conference on Network and Service Security (N2S '09), pp. 1–6
23.
Zurück zum Zitat Wu K, Liu C, Xiao Y, Liu J (2009) Delay-constrained optimal data aggregation in hierarchical wireless sensor networks. Mob Netw Appl 14(5):571–589CrossRef Wu K, Liu C, Xiao Y, Liu J (2009) Delay-constrained optimal data aggregation in hierarchical wireless sensor networks. Mob Netw Appl 14(5):571–589CrossRef
24.
Zurück zum Zitat Bellman RE (1961) Adaptive control processes: a guided tour. Princeton University Press, PrincetonMATH Bellman RE (1961) Adaptive control processes: a guided tour. Princeton University Press, PrincetonMATH
25.
Zurück zum Zitat Li H, Zhang G, Li D, Li X (2008) Computation on Attribute Importance of Classification Based on Cloud Model. 2008 International Conference on Computational Intelligence for Modeling Control & Automation, pp. 879–883 Li H, Zhang G, Li D, Li X (2008) Computation on Attribute Importance of Classification Based on Cloud Model. 2008 International Conference on Computational Intelligence for Modeling Control & Automation, pp. 879–883
26.
Zurück zum Zitat Sima C, Dougherty ER (2008) The peaking phenomenon in the presence of feature-selection. Pattern Recogn Lett 29(11):1667–1674CrossRef Sima C, Dougherty ER (2008) The peaking phenomenon in the presence of feature-selection. Pattern Recogn Lett 29(11):1667–1674CrossRef
Metadaten
Titel
Cheetah: a space-efficient HNB-based NFAT approach to supporting network forensics
verfasst von
Bo-Chao Cheng
Guo-Tan Liao
Hsu-Chen Huang
Ping-Hai Hsu
Publikationsdatum
01.08.2014
Verlag
Springer Paris
Erschienen in
Annals of Telecommunications / Ausgabe 7-8/2014
Print ISSN: 0003-4347
Elektronische ISSN: 1958-9395
DOI
https://doi.org/10.1007/s12243-013-0404-5

Weitere Artikel der Ausgabe 7-8/2014

Annals of Telecommunications 7-8/2014 Zur Ausgabe

Neuer Inhalt