...
首页> 外文期刊>International Journal of Computer Trends and Technology >An Adaptive Log Based Realtime Network Scans in LAN
【24h】

An Adaptive Log Based Realtime Network Scans in LAN

机译:LAN中基于自适应日志的实时网络扫描

获取原文
   

获取外文期刊封面封底 >>

       

摘要

Network scans really are a common initial step within a network intrusion attempt. As a way to gain details about a possible network intrusion, it can be beneficial to analyze these network scans. Scanning activity is naturally a common activity over the internet today, representing malicious activity such as information gathering by the motivated adversary or automated tool on the lookout for vulnerable hosts (e.g., worms). Many scan detection techniques have been developed; however, their focus has been on smaller networks where packetlevel information is available, or where internal characteristics of this very network have been observed. Existing approaches use scan detection technique as a way to identify of packetlevel data between host pairs, and activities are identified by grouping sessions based on patterns inside the kinds of session, the IP addresses, plus the ports. For serious networks, which can include those of ISPs, large corporations or government organizations, people's information might not be available. Existing model offers a model of scans which can be used given only unidirectional flow data. Novel classification of scan detection methods based upon their network policy, since attackers usually takes benefit for such policies to evade detection. The intention of the proposed program is to analyze sample network traces to discover and classify properties of port scans using robust Probabilistic technique. Finally scan detection accuracy can possibly be analyzed by employing logistic regression approach that is used to model the post that informs a user if a scan is present. Experimental results will provides insight into Internet traffic by classifying known activities, giving visibility to threats to the network through scan detection, which correspondingly extending understanding of the activities occurring on the network.
机译:网络扫描实际上是网络入侵尝试中常见的初始步骤。作为获取有关可能的网络入侵的详细信息的一种方法,分析这些网络扫描可能会有所帮助。扫描活动自然是当今互联网上的常见活动,代表恶意活动,例如由有动机的对手收集的信息或自动工具在监视易受攻击的主机(例如蠕虫)时收集的信息。已经开发了许多扫描检测技术。但是,他们的重点是在较小的网络上,这些网络可以使用数据包级别的信息,或者可以观察到该网络的内部特征。现有的方法使用扫描检测技术来识别主机对之间的数据包级数据,并且通过基于会话种类,IP地址和端口内的模式对会话进行分组来识别活动。对于严肃的网络(可能包括ISP,大型公司或政府组织的网络),人们的信息可能不可用。现有模型提供了一种扫描模型,仅在给出单向流数据时才可以使用。基于攻击者网络策略的扫描检测方法的新颖分类,因为攻击者通常会利用这种策略来逃避检测。拟议程序的目的是分析样本网络跟踪,以使用健壮的概率技术来发现和分类端口扫描的属性。最后,可以通过采用逻辑回归方法分析扫描检测的准确性,该方法用于对通知用户是否存在扫描的帖子进行建模。实验结果将通过对已知活动进行分类来提供对Internet流量的洞察,通过扫描检测提供对网络威胁的可见性,从而相应地扩展对网络上发生的活动的了解。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号