首页> 外文会议>Annual International Conference on Privacy, Security and Trust >Peer Based Tracking using Multi-Tuple Indexing for Network Traffic Analysis and Malware Detection
【24h】

Peer Based Tracking using Multi-Tuple Indexing for Network Traffic Analysis and Malware Detection

机译:基于对等基于对网络流量分析和恶意软件检测的多元组索引的跟踪

获取原文

摘要

Traditional firewalls, Intrusion Detection Systems(IDS) and network analytics tools extensively use the `flow' connection concept, consisting of five `tuples' of source and destination IP, ports and protocol type, for classification and management of network activities. By analysing flows, information can be obtained from TCP/IP fields and packet content to give an understanding of what is being transferred within a single connection. As networks have evolved to incorporate more connections and greater bandwidth, particularly from “always on” IoT devices and video and data streaming, so too have malicious network threats, whose communication methods have increased in sophistication. As a result, the concept of the 5 tuple flow in isolation is unable to detect such threats and malicious behaviours. This is due to factors such as the length of time and data required to understand the network traffic behaviour, which cannot be accomplished by observing a single connection. To alleviate this issue, this paper proposes the use of additional, two tuple and single tuple flow types to associate multiple 5 tuple communications, with generated metadata used to profile individual connnection behaviour. This proposed approach enables advanced linking of different connections and behaviours, developing a clearer picture as to what network activities have been taking place over a prolonged period of time. To demonstrate the capability of this approach, an expert system rule set has been developed to detect the presence of a multi-peered ZeuS botnet, which communicates by making multiple connections with multiple hosts, thus undetectable to standard IDS systems observing 5 tuple flow types in isolation. Finally, as the solution is rule based, this implementation operates in realtime and does not require post-processing and analytics of other research solutions. This paper aims to demonstrate possible applications for next generation firewalls and methods to acquire additional information from network traffic.
机译:传统防火墙,入侵检测系统(IDS)和网络分析工具广泛地使用“流量”连接概念,由源和目的地IP,端口和协议类型的五个“组合”,用于网络活动的分类和管理。通过分析流动,可以从TCP / IP字段和数据包内容获得信息,以了解在单个连接中传输的内容。随着网络的发展,以合并更多的连接和更大的带宽,特别是“始终在”物联网设备和视频和数据流中,因此具有恶意网络威胁,其通信方法在复杂程度上增加。结果,孤立5元组流量的概念无法检测到这种威胁和恶意行为。这是由于诸如了解网络流量行为所需的时间长度和数据的因素,这不能通过观察单个连接来实现。为了缓解此问题,本文提出使用附加,两个元组和单个元组流类型来关联多个元组通信,并使用生成的元数据来配置各个连接行为。这一提出的方法能够高级连接不同的连接和行为,开发更清晰的图片,即在长时间延长的网络活动。为了展示这种方法的能力,已经开发了一种专家系统规则集来检测多诊断的存在,通过使多个主机进行多个连接来传达,从而无法观察5元组流程的标准IDS系统。隔离。最后,由于解决方案是基于规则的,因此该实现实时运行,不需要其他研究解决方案的后处理和分析。本文旨在展示下一代防火墙和方法从网络流量获取其他信息的可能应用。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号