Network Attack Detection Based on Peer-to-Peer Clustering of SNMP Data

被引:0
|
作者
Cerroni, Walter [1 ]
Monti, Gabriele [1 ]
Moro, Gianluca [1 ]
Ramilli, Marco [1 ]
机构
[1] DEIS Univ Bologna, I-47521 Cesena, FC, Italy
关键词
Network security; distributed intrusion detection; SNMP; data mining; data clustering; peer-to-peer; ANOMALY DETECTION;
D O I
暂无
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
Network intrusion detection is a key security issue that can be tackled by means of different approaches. This paper describes a novel methodology for network attack detection based on the use of data mining techniques to process traffic information collected by a monitoring station from a set of hosts using the Simple Network Management Protocol (SNMP). The proposed approach, adopting unsupervised clustering techniques, allows to effectively distinguish normal traffic behavior from malicious network activity and to determine with very good accuracy what kind of attack is being perpetrated. Several monitoring stations are then interconnected according to any peer-to-peer network in order to share the knowledge base acquired with the proposed methodology, thus increasing the detection capabilities. An experimental test-bed has been implemented, which reproduces the case of a real web server under several attack techniques. Results of the experiments show the effectiveness of the proposed solution, with no detection failures of true attacks and very low false-positive rates (i.e. false alarms).
引用
收藏
页码:417 / 430
页数:14
相关论文
共 50 条
  • [31] A "cluster" based search scheme in peer-to-peer network
    李振武
    杨舰
    史旭东
    白英彩
    Journal of Zhejiang University-Science A(Applied Physics & Engineering), 2003, (05) : 48 - 53
  • [32] Piracy Over Peer-To-Peer Based on Personal Network
    Rajeev Prasad
    Wireless Personal Communications, 2006, 37 : 221 - 231
  • [33] Dynamic service composition based on peer-to-peer network
    Zhu, Weihua
    Du, Zhihui
    Zhu, Suihui
    SOSE 2006: SECOND IEEE INTERNATIONAL SYMPOSIUM ON SERVICE-ORIENTED SYSTEM ENGINEERING, PROCEEDINGS, 2006, : 205 - +
  • [34] Peer-to-peer File Sharing Based on Network Coding
    Yang, Min
    Yang, Yuanyuan
    28TH INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING SYSTEMS, VOLS 1 AND 2, PROCEEDINGS, 2008, : 168 - 175
  • [35] Indra: A peer-to-peer approach to network intrusion detection and prevention
    Janakiraman, R
    Waldvogel, M
    Zhang, Q
    TWELFTH IEEE INTERNATIONAL WORKSHOPS ON ENABLING TECHNOLOGIES: INFRASTRUCTURE FOR COLLABORATIVE ENTERPRISES, PROCEEDINGS, 2003, : 226 - 231
  • [36] QoS based peer-to-peer network search model
    Lu Wei
    Meng Xianyu
    2006 8TH INTERNATIONAL CONFERENCE ON SIGNAL PROCESSING, VOLS 1-4, 2006, : 2379 - +
  • [37] Federation based solution for peer-to-peer network management
    Wang, Jilong
    Zhang, Jing
    COMPUTATIONAL SCIENCE - ICCS 2007, PT 4, PROCEEDINGS, 2007, 4490 : 765 - +
  • [38] Piracy over Peer-to-Peer based on Personal Network
    Prasad, Rajeev
    WIRELESS PERSONAL COMMUNICATIONS, 2006, 37 (3-4) : 221 - 231
  • [39] Practical Implementation of Femtolet Based Peer-to-Peer Network
    Roy, Deepsubhra Guha
    Mukherjee, Anwesha
    De, Debashis
    Srirama, Satish Narayana
    WIRELESS PERSONAL COMMUNICATIONS, 2019, 108 (04) : 2477 - 2498
  • [40] Peer-to-peer data management
    Garcia-Molina, H
    18TH INTERNATIONAL CONFERENCE ON DATA ENGINEERING, PROCEEDINGS, 2002, : 503 - 503