The necessary spread of the access points to network services makes them vulnerable to many potential and different types of attackers: script kiddies, hackers, and misfeasors. Although the network services produce a great quantity of data logged by hosts, it is impossible for a security officer, and generally for a network administrator, to monitor daily generated traffic in order to control attacks. Currently a LAN is defended with a mixture of solutions adopted at different levels. Commercial firewalls typically use descriptive statistics to give the security officer information about the quantitative characteristics of the TCP/IP traffic as a whole. In this work, we generate information on the "profile" of connections by means of clustering techniques. This approach makes the security officer able to detect connections that are far away from the mass. We use different clustering techniques in order to study their response for this type of problem. Results on real traffic data are reported and commented.
机构:
Virginia Commonwealth Univ, Sch Med, Richmond, VA USA
VCU Hlth Syst, Med Affairs, Richmond, VA USAVirginia Commonwealth Univ, Sch Med, Richmond, VA USA
Buckley, Peter F.
Miller, Brian J.
论文数: 0引用数: 0
h-index: 0
机构:
Augusta Univ, Dept Psychiat & Hlth Behav, Augusta, GA USAVirginia Commonwealth Univ, Sch Med, Richmond, VA USA