A Behavior-based Method for Detecting Distributed Scan Attacks in Darknets (Preprint)
スポンサーリンク
概要
- 論文の詳細を見る
The technologies used by attackers in the Internet environment are becoming more and more sophisticated. Of the many kinds of attacks, distributed scan attacks have become one of the most serious problems. In this study, we propose a novel method based on normal behavior modes of traffic to detect distributed scan attacks in darknet environments. In our proposed method, all the possible destination TCP and UDP ports are monitored, and when a port is attacked by a distributed scan, an alert is given. Moreover, the alert can have several levels reflecting the relative scale of the attack. To accelerate learning and updating the normal behavior modes and to realize rapid detection, an index is introduced, which is proved to be very efficient. The efficiency of our proposal is verified using real darknet traffic data. Although our proposal focuses on darknets, the idea can also be applied to ordinary networks.------------------------------This is a preprint of an article intended for publication Journal ofInformation Processing(JIP). This preprint should not be cited. Thisarticle should be cited as: Journal of Information Processing Vol.21(2013) No.3 (online)------------------------------
- 2013-06-15
著者
-
Yoshiaki Hori
Department of Informatics, Kyushu University
-
Kouichi Sakurai
Graduate School of Information Science and Electrical Engineering, Kyushu University | Institute of Systems, Information Technologies and Nanotechnologies (ISIT)
-
Yoshiaki Hori
Graduate School of Information Science and Electrical Engineering, Kyushu University | Institute of Systems, Information Technologies and Nanotechnologies (ISIT)
-
Jun'ichi Takeuchi
Graduate School of Information Science and Electrical Engineering, Kyushu University | Institute of Systems, Information Technologies and Nanotechnologies (ISIT)
-
Yaokai Feng
Graduate School of Information Science and Electrical Engineering, Kyushu University | Institute of Systems, Information Technologies and Nanotechnologies (ISIT)
関連論文
- Elliptic curve ElGamal Threshold-based Key Management Scheme against Compromise of Distributed RSUs for VANETs
- A Behavior-based Method for Detecting Distributed Scan Attacks in Darknets (Preprint)