Cybersecurity and Network Forensics: Analysis of Malicious Traffic towards a Honeynet with Deep Packet Inspection

被引:22
|
作者
Pimenta Rodrigues, Gabriel Arquelau [1 ]
Albuquerque, Robson de Oliveira [1 ]
Gomes de Deus, Flavio Elias [1 ]
de Sousa, Rafael Timoteo, Jr. [1 ]
de Oliveira Junior, Gildasio Antonio [1 ]
Garcia Villalba, Luis Javier [2 ]
Kim, Tai-Hoon [3 ]
机构
[1] Univ Brasilia UnB, Technol Coll, Elect Engn Dept ENE, Decis Technol Lab LATITUDE,Cybersecur INCT Unit 6, BR-70910900 Brasilia, DF, Brazil
[2] Univ Complutense Madrid, Fac Comp Sci & Engn, Dept Software Engn & Artificial Intelligence DISI, Off 431,GASS, Calle Prof Jose Garcia Santesmases 9,Ciudad Univ, E-28040 Madrid, Spain
[3] Sungshin Womens Univ, Dept Convergence Secur, 249-1 Dongseon Dong 3 Ga, Seoul 136742, South Korea
来源
APPLIED SCIENCES-BASEL | 2017年 / 7卷 / 10期
关键词
cybersecurity; network security; traffic analysis; deep packet inspection; intrusion detection; network forensics;
D O I
10.3390/app7101082
中图分类号
O6 [化学];
学科分类号
0703 ;
摘要
Any network connected to the Internet is subject to cyber attacks. Strong security measures, forensic tools, and investigators contribute together to detect and mitigate those attacks, reducing the damages and enabling reestablishing the network to its normal operation, thus increasing the cybersecurity of the networked environment. This paper addresses the use of a forensic approach with Deep Packet Inspection to detect anomalies in the network traffic. As cyber attacks may occur on any layer of the TCP/ IP networking model, Deep Packet Inspection is an effective way to reveal suspicious content in the headers or the payloads in any packet processing layer, excepting of course situations where the payload is encrypted. Although being efficient, this technique still faces big challenges. The contributions of this paper rely on the association of Deep Packet Inspection with forensics analysis to evaluate different attacks towards a Honeynet operating in a network laboratory at the University of Brasilia. In this perspective, this work could identify and map the content and behavior of attacks such as the Mirai botnet and brute-force attacks targeting various different network services. Obtained results demonstrate the behavior of automated attacks (such as worms and bots) and non-automated attacks (brute-force conducted with different tools). The data collected and analyzed is then used to generate statistics of used usernames and passwords, IP and services distribution, among other elements. This paper also discusses the importance of network forensics and Chain of Custody procedures to conduct investigations and shows the effectiveness of the mentioned techniques in evaluating different attacks in networks.
引用
收藏
页数:29
相关论文
共 50 条
  • [1] A Software Deep Packet Inspection System for Network Traffic Analysis and Anomaly Detection
    Song, Wenguang
    Beshley, Mykola
    Przystupa, Krzysztof
    Beshley, Halyna
    Kochan, Orest
    Pryslupskyi, Andrii
    Pieniak, Daniel
    Su, Jun
    [J]. SENSORS, 2020, 20 (06)
  • [2] Development of Deep Packet Inspection System for Network Traffic Analysis and Intrusion Detection
    Cheng, Zhihui
    Beshley, Mykola
    Beshley, Halyna
    Kochan, Orest
    Urikova, Oksana
    [J]. 15TH INTERNATIONAL CONFERENCE ON ADVANCED TRENDS IN RADIOELECTRONICS, TELECOMMUNICATIONS AND COMPUTER ENGINEERING (TCSET - 2020), 2020, : 877 - 881
  • [3] A Deep Hierarchical Network for Packet-Level Malicious Traffic Detection
    Wang, Bo
    Su, Yang
    Zhang, Mingshu
    Nie, Junke
    [J]. IEEE ACCESS, 2020, 8 : 201728 - 201740
  • [4] Towards Accurate Categorization of Network IP Traffic Using Deep Packet Inspection and Machine Learning
    Aziz, Waqar Ali
    Qureshi, Hassaan Khaliq
    Iqbal, Adnan
    Al-Dulaimi, Anwer
    Al-Rubaye, Saba
    [J]. IEEE CONFERENCE ON GLOBAL COMMUNICATIONS, GLOBECOM, 2023, : 273 - 278
  • [5] Using Deep Packet Inspection in Cyber Traffic Analysis
    Deri, Luca
    Fusco, Francesco
    [J]. PROCEEDINGS OF THE 2021 IEEE INTERNATIONAL CONFERENCE ON CYBER SECURITY AND RESILIENCE (IEEE CSR), 2021, : 89 - 94
  • [6] Malicious Traffic Detection in a Private Organizational Network Using Honeynet System
    Kaur, Rupinder
    Nagpal, Sunil
    Chamotra, Saurabh
    [J]. 2015 ANNUAL IEEE INDIA CONFERENCE (INDICON), 2015,
  • [7] Towards the Detection of Encrypted BitTorrent Traffic through Deep Packet Inspection
    Carvalho, David A.
    Pereira, Manuela
    Freire, Mario M.
    [J]. SECURITY TECHNOLOGY, PROCEEDINGS, 2009, 58 : 265 - 272
  • [8] Understanding the Network Traffic Constraints for Deep Packet Inspection by Passive Measurement
    Liu, Jun
    Zheng, Chao
    Guo, Li
    Liu, Xueli
    Lu, Qiuwen
    [J]. 2018 3RD INTERNATIONAL CONFERENCE ON INFORMATION SYSTEMS ENGINEERING (ICISE), 2018, : 26 - 32
  • [9] Research on Network Traffic Identification based on Machine Learning and Deep Packet Inspection
    Yang, Bowen
    Liu, Dong
    [J]. PROCEEDINGS OF 2019 IEEE 3RD INFORMATION TECHNOLOGY, NETWORKING, ELECTRONIC AND AUTOMATION CONTROL CONFERENCE (ITNEC 2019), 2019, : 1887 - 1891
  • [10] Efficient Keyword Matching for Deep Packet Inspection based Network Traffic Classification
    Khandait, Pratibha
    Hubballi, Neminath
    Mazumdar, Bodhisatwa
    [J]. 2020 INTERNATIONAL CONFERENCE ON COMMUNICATION SYSTEMS & NETWORKS (COMSNETS), 2020,