Automated Port-scan Classification with Decision Tree and Distributed Sensors
スポンサーリンク
概要
- 論文の詳細を見る
Computer worms randomly perform port scans to find vulnerable hosts to intrude over the Internet. Malicious software varies its port-scan strategy e.g. some hosts intensively perform scans on a particular target and some hosts scan uniformly over IP address blocks. In this paper we propose a new automated worm classification scheme from distributed observations. Our proposed scheme can detect some statistics of behavior with a simple decision tree consisting of some nodes to classify source addresses with optimal threshold values. The choice of thresholds is automated to minimize the entropy gain of the classification. Once a tree has been constructed the classification can be done very quickly and accurately. In this paper we analyze a set of source addresses observed by the distributed 30 sensors in ISDAS for a year in order to clarify a primary statistics of worms. Based on the statistical characteristics we present the proposed classification and show the performance of the proposed scheme<sup>*1</sup>.
- 一般社団法人情報処理学会の論文
- 2008-09-15
著者
-
Hiroaki Kikuchi
School of Information and Network Engineering, Tokai University
-
Masato Terada
Hitachi, Ltd. Hitachi Incident Response Team (HIRT)
-
Masato Terada
Hitachi Ltd. Hitachi Incident Response Team (hirt)
-
Hiroaki Kikuchi
Tokai University
-
Naoya Fukuno
School of Information Technology Tokai University
-
Tomohiro Kobori
School of Information Technology Tokai University
-
Tangtisanon Pikulkaew
Faculty of Engineering King Mongkut's Institute of Technology Ladkrabang
-
Tangtisanon Pikulkaew
School Of Information Technology Tokai University
関連論文
- Principal Component Analysis of Port-scans for Reduction of Distributed Sensors
- Frequent Sequential Attack Patterns of Malware in Botnets
- Frequent Sequential Attack Patterns of Malware in Botnets
- Automated Port-scan Classification with Decision Tree and Distributed Sensors
- Estimation of Increase of Scanners Based on ISDAS Distributed Sensors
- Principal Component Analysis of Botnet Takeover
- Perfect Privacy-preserving Automated Trust Negotiation
- Mining Botnet Coordinated Attacks using Apriori-PrefixSpan Hybrid Algorithm (Preprint)