Detecting malicious activities through port profiling

被引:0
|
作者
Iguchi, M [1 ]
Goto, S
机构
[1] Waseda Univ, Grad Sch Sci & Technol, Tokyo 1698555, Japan
[2] Waseda Univ, Sch Sci & Engn, Tokyo 1698555, Japan
来源
关键词
intrusion detection; auditing; profiling; network surveillance;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This paper presents a network surveillance technique for detecting malicious activities. Based on the hypothesis that unusual conducts like system exploitation will trigger an abnormal network pattern, we try to detect this anomalous network traffic pattern as a sign of malicious, or at least suspicious activities. Capturing and analyzing of a network traffic pattern is implemented with a concept of port profiling, where measures representing various characteristics of connections are monitored and recorded for each port. Though the generation of the port profiles requires the minimum calculation and memory, they exhibit high stability and robustness. Each port profile retains the patterns of the corresponding connections precisely, even if the connections demonstrate multi-modal characteristics. By comparing the pattern exhibited by live traffic with the expected behavior recorded in the profile, intrusive activities like compromising backdoors or invoking trojan programs are successfully detected.
引用
收藏
页码:784 / 792
页数:9
相关论文
共 50 条
  • [1] Malware Analysis: The Art of Detecting Malicious Activities
    El-moussa, Fadi
    Jones, Andy
    [J]. PROCEEDINGS OF THE 7TH EUROPEAN CONFERENCE ON INFORMATION WARFARE AND SECURITY, 2008, : 51 - 59
  • [2] Detecting Insider Malicious Activities in Cloud Collaboration Systems
    Smrithy, G. S.
    Cuzzocrea, Alfredo
    Balakrishnan, Ramadoss
    [J]. FUNDAMENTA INFORMATICAE, 2018, 161 (03) : 299 - 316
  • [3] Detecting malicious activities with user-agent-based profiles
    Zhang, Yang
    Mekky, Hesham
    Zhang, Zhi-Li
    Torres, Ruben
    Lee, Sung-Ju
    Tongaonkar, Alok
    Mellia, Marco
    [J]. INTERNATIONAL JOURNAL OF NETWORK MANAGEMENT, 2015, 25 (05) : 306 - 319
  • [4] BotProfiler: Detecting Malware-Infected Hosts by Profiling Variability of Malicious Infrastructure
    Chiba, Daiki
    Yagi, Takeshi
    Akiyama, Mitsuaki
    Aoki, Kazufumi
    Hariu, Takeo
    Goto, Shigeki
    [J]. IEICE TRANSACTIONS ON COMMUNICATIONS, 2016, E99B (05) : 1012 - 1023
  • [5] Detecting Malicious Hosts in SDN through System Call Learning
    Chasaki, Danai
    Mansour, Christopher
    [J]. IEEE CONFERENCE ON COMPUTER COMMUNICATIONS WORKSHOPS (IEEE INFOCOM WKSHPS 2021), 2021,
  • [6] Profiling of Malicious Users Targeting Ethereum's RPC Port Using Simple Honeypots
    Hara, Kazuki
    Sato, Teppei
    Imamura, Mitsuyoshi
    Omote, Kazumasa
    [J]. 2020 IEEE INTERNATIONAL CONFERENCE ON BLOCKCHAIN (BLOCKCHAIN 2020), 2020, : 1 - 8
  • [7] Detecting Malicious Java']Javascript in PDF through Document Instrumentation
    Liu, Daiping
    Wang, Haining
    Stavrou, Angelos
    [J]. 2014 44TH ANNUAL IEEE/IFIP INTERNATIONAL CONFERENCE ON DEPENDABLE SYSTEMS AND NETWORKS (DSN), 2014, : 100 - 111
  • [8] Detecting malicious SQL
    Fonseca, Jose
    Vieira, Marco
    Madeira, Henrique
    [J]. TRUST, PRIVACY AND SECURITY IN DIGITAL BUSINESS, PROCEEDINGS, 2007, 4657 : 259 - +
  • [9] Deep Learning Approach for Detecting Malicious Activities Over Encrypted Secure Channels
    Yang, Jiwon
    Lim, Hyuk
    [J]. IEEE ACCESS, 2021, 9 (09): : 39229 - 39244
  • [10] MiGuard: Detecting and Guarding against Malicious Iframe through API Hooking
    Yun, JooBeom
    Shin, Youngjoo
    Kim, HyoungChun
    Yoon, Hyunsoo
    [J]. IEICE ELECTRONICS EXPRESS, 2011, 8 (07): : 460 - 465