首页> 外文会议>Networking 2009 >Scan Surveillance in Internet Networks
【24h】

Scan Surveillance in Internet Networks

机译:扫描Internet网络中的监视

获取原文
获取原文并翻译 | 示例
获取外文期刊封面目录资料

摘要

In recent years, many measurement studies have shown the ubiquity of scanning activities in the Internet and the growing sophistication of probing techniques that became more stealthy by stretching slowly over time or using spoofed source IP addresses. Scans are mainly generated by attackers trying to map the configuration of a target network and by computer worms trying to spread over the Internet. Although, the problem of scan detection has been given a lot of attention by network security researchers, current state-of-the-art methods still suffer from high percentage of false alarms or low ratio of scan detection. In this paper, we propose to detect changes in scanning patterns, by monitor variation of the distribution of scan features in a space spanned by IP source address, IP destination address, source port number, and destination port number. This gives insight on characteristics of scanning activities and exposes the presence of emerging scanning attacks and worms. For that, we propose to use an information theoretic-based approach to detect changes in distributions.
机译:近年来,许多测量研究表明,Internet上的扫描活动无处不在,并且随着时间的推移缓慢扩展或使用欺骗性的源IP地址,探测技术变得越来越隐秘。扫描主要由试图映射目标网络配置的攻击者和试图在Internet上传播的计算机蠕虫生成。尽管网络安全研究人员已将扫描检测问题引起了很多关注,但当前的最新方法仍然存在误报率高或扫描检测率低的问题。在本文中,我们建议通过监视IP源地址,IP目标地址,源端口号和目标端口号所跨越的空间中扫描功能的分布变化来检测扫描模式的变化。这样可以洞悉扫描活动的特征,并揭示新兴的扫描攻击和蠕虫的存在。为此,我们建议使用基于信息理论的方法来检测分布的变化。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号