Detecting Malicious Activities through Port Profiling (Special Issue on Internet Technology and Its Applications)
スポンサーリンク
概要
- 論文の詳細を見る
This paper presents a network surveillance technique for detecting malicious activities. Based on the hypothesis that unusual conducts like system exploitation will trigger an abnormal network pattern, we try to detect this anomalous network traffic pattern as a sign of malicious, or at least suspicious activities. Capturing and analyzing of a network traffic pattern is implemented with a concept of port profiling, where measures representing various characteristics of connections are monitored and recorded for each port. Though the generation of the port profiles requires the minimum calculation and memory, they exhibit high stability and robustness. Each port profile retains the patterns of the corresponding connections precisely, even if the connections demonstrate multi-modal characteristics. By comparing the pattern exhibited by live traffic with the expected behavior recorded in the profile, intrusive activities like compromising backdoors or invoking trojan programs are successfully detected.
- 社団法人電子情報通信学会の論文
- 1999-04-25
著者
-
Goto Shigeki
School of Science and Engineering, Waseda University
-
Goto Shigeki
School Of Science And Engineering Waseda University
-
IGUCHI Makoto
Graduate School of Science and Technology, Waseda University
-
Iguchi M
Graduate School Of Science And Technology Waseda University
関連論文
- New Query Type for Internationalized Domain Names
- Extension of DNS to the Internationalized Domain Names (Special Issue on High-speed Internet Technology and its Applications)
- A New Protocol for Double Auction Based on Homomorphic Encryption(New Technologies in the Internet and their Applications)
- A New Protocol for Double Auction Based on Homomorphic Encryption
- Traffic Matrix Estimation Using Spike Flow Detection(Internet Technology V)
- Anonymous P2P Web Browse History Sharing for Web Page Recommendation(Software Agent and Its Applications)
- Detecting Malicious Activities through Port Profiling (Special Issue on Internet Technology and Its Applications)
- End-to-End Delay Distribution on the Internet (Special Issue on Internet Technology and Its Applications)
- BS-7-5 Design of ICN Testbed in AsiaFI