Detection of zero-day attacks: An unsupervised port-based approach

被引:32
|
作者
Blaise, Agathe [1 ,2 ]
Bouet, Mathieu [1 ]
Conan, Vania [1 ]
Secci, Stefano [3 ]
机构
[1] Thales, Gennevilliers, France
[2] Sorbonne Univ, LIP6 France, CNRS, Paris, France
[3] Cnam, Cedric, F-75003 Paris, France
关键词
NETWORK ANOMALY DETECTION; SCANS;
D O I
10.1016/j.comnet.2020.107391
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Last years have witnessed more and more DDoS attacks towards high-profile websites, as the Mirai botnet attack on September 2016, or more recently the memcached attack on March 2018, this time with no bother required. These two outbreaks were not detected nor mitigated during their spreading, but only at the time they happened. Such attacks are generally preceded by several stages, including infection of hosts or device fingerprinting; being able to capture this activity would allow their early detection. In this paper, we propose a technique for the early detection of emerging botnets and newly exploited vulnerabilities, which consists in (i) splitting the detection process over different network segments and retaining only distributed anomalies, (ii) monitoring at the port-level, with a simple yet efficient change-detection algorithm based on a modified Z-score measure. We argue how our technique, named Split-and-Merge, can ensure the detection of large-scale zero-day attacks and drastically reduce false positives. We apply the method on two datasets: the MAWI dataset, which provides daily traffic traces of a transpacific backbone link, and the UCSD Network Telescope dataset which contains unsolicited traffic mainly coming from botnet scans. The assumption of a normal distribution - for which the Z-score computation makes sense - is verified through empirical measures. We also show how the solution generates very few alerts; an extensive evaluation on the last three years allows identifying major attacks (including Mirai and memcached) that current Intrusion Detection Systems (IDSs) have not seen. Finally, we classify detected known and unknown anomalies to give additional insights about them.
引用
收藏
页数:15
相关论文
共 50 条
  • [41] Training for the unknown: The role of feedback and similarity in detecting zero-day attacks
    Ben-Asher, Noam
    Gonzalez, Cleotilde
    [J]. 6TH INTERNATIONAL CONFERENCE ON APPLIED HUMAN FACTORS AND ERGONOMICS (AHFE 2015) AND THE AFFILIATED CONFERENCES, AHFE 2015, 2015, 3 : 1088 - 1095
  • [42] Cyber resilience recovery model to combat zero-day malware attacks
    Tran, Hiep
    Campos-Nanez, Enrique
    Fomin, Pavel
    Wasek, James
    [J]. COMPUTERS & SECURITY, 2016, 61 : 19 - 31
  • [43] A Systematic Literature Review on AI-Based Methods and Challenges in Detecting Zero-Day Attacks
    Yee Por, Lip
    Dai, Zhen
    Juan Leem, Siew
    Chen, Yi
    Yang, Jing
    Binbeshr, Farid
    Yuen Phan, Koo
    Soon Ku, Chin
    [J]. IEEE Access, 2024, 12 : 144150 - 144163
  • [44] Big Data Framework for Zero-Day Malware Detection
    Gupta, Deepak
    Rani, Rinkle
    [J]. CYBERNETICS AND SYSTEMS, 2018, 49 (02) : 103 - 121
  • [45] Distributed Detection of Zero-Day Network Traffic Flows
    Miao, Yuantian
    Pan, Lei
    Rajasegarar, Sutharshan
    Zhang, Jun
    Leckie, Christopher
    Xiang, Yang
    [J]. DATA MINING, AUSDM 2017, 2018, 845 : 173 - 191
  • [46] Zero-day attack detection: a systematic literature review
    Ahmad, Rasheed
    Alsmadi, Izzat
    Alhamdani, Wasim
    Tawalbeh, Lo'ai
    [J]. ARTIFICIAL INTELLIGENCE REVIEW, 2023, 56 (10) : 10733 - 10811
  • [47] SimCSE for Encrypted Traffic Detection and Zero-Day Attack Detection
    Bar, Rotem
    Hajaj, Chen
    [J]. IEEE ACCESS, 2022, 10 : 56952 - 56960
  • [48] Detecting zero-day attacks using context-aware anomaly detection at the application-layer
    Duessel, Patrick
    Gehl, Christian
    Flegel, Ulrich
    Dietrich, Sven
    Meier, Michael
    [J]. INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2017, 16 (05) : 475 - 490
  • [49] A Survey on Zero-Day Polymorphic Worm Detection Techniques
    Kaur, Ratinder
    Singh, Maninder
    [J]. IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2014, 16 (03): : 1520 - 1549
  • [50] Use of Data Visualisation for Zero-Day Malware Detection
    Venkatraman, Sitalakshmi
    Alazab, Mamoun
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2018,