Detection of slow port scans in flow-based network traffic

被引:26
|
作者
Ring, Markus [1 ]
Landes, Dieter [1 ]
Hotho, Andreas [2 ]
机构
[1] Coburg Univ Appl Sci & Arts, Fac Elect Engn & Informat, D-96450 Coburg, Germany
[2] Univ Wurzburg, Data Min & Informat Retrieval Grp, D-97074 Wurzburg, Germany
来源
PLOS ONE | 2018年 / 13卷 / 09期
关键词
D O I
10.1371/journal.pone.0204507
中图分类号
O [数理科学和化学]; P [天文学、地球科学]; Q [生物科学]; N [自然科学总论];
学科分类号
07 ; 0710 ; 09 ;
摘要
Frequently, port scans are early indicators of more serious attacks. Unfortunately, the detection of slow port scans in company networks is challenging due to the massive amount of network data. This paper proposes an innovative approach for preprocessing flow-based data which is specifically tailored to the detection of slow port scans. The preprocessing chain generates new objects based on flow-based data aggregated over time windows while taking domain knowledge as well as additional knowledge about the network structure into account. The computed objects are used as input for the further analysis. Based on these objects, we propose two different approaches for detection of slow port scans. One approach is unsupervised and uses sequential hypothesis testing whereas the other approach is supervised and uses classification algorithms. We compare both approaches with existing port scan detection algorithms on the flow-based CIDDS-001 data set. Experiments indicate that the proposed approaches achieve better detection rates and exhibit less false alarms than similar algorithms.
引用
收藏
页数:18
相关论文
共 50 条
  • [21] Flow-based Network Intrusion Detection Based on BERT Masked Language Model
    Nguyen, Loc Gia
    Watabe, Kohei
    PROCEEDINGS OF THE INTERNATIONAL CONEXT STUDENT WORKSHOP 2022, CONEXT-SW 2022, 2022, : 7 - 8
  • [22] Conceptual integration of flow-based and packet-based network intrusion detection
    Schaffrath, Gregor
    Stiller, Burkhard
    RESILIENT NETWORKS AND SERVICES, 2008, 5127 : 190 - 194
  • [23] Flow Simulator - a flow-based network simulator
    Drzewiecki, Lukasz
    Antoniak-Lewandowska, Monika
    EUROCON 2007: THE INTERNATIONAL CONFERENCE ON COMPUTER AS A TOOL, VOLS 1-6, 2007, : 2124 - 2128
  • [24] A study of flow-based traffic admission control algorithm in the ATM-based MPLS network
    Lee, GM
    Choi, JK
    15TH INTERNATIONAL CONFERENCE ON INFORMATION NETWORKING, PROCEEDINGS, 2001, : 213 - 218
  • [25] FlowGANAnomaly: Flow-Based Anomaly Network Intrusion Detection with Adversarial Learning
    Li, Zeyi
    Wang, Pan
    Wang, Zixuan
    Zhan, De-chuan
    CHINESE JOURNAL OF ELECTRONICS, 2024, 33 (01) : 58 - 71
  • [26] FlowGANAnomaly: Flow-Based Anomaly Network Intrusion Detection with Adversarial Learning
    Zeyi LI
    Pan WANG
    Zixuan WANG
    Chinese Journal of Electronics, 2024, 33 (01) : 58 - 71
  • [27] Improving network anomaly detection via selective flow-based sampling
    Androulidakis, G.
    Papavassiliou, S.
    IET COMMUNICATIONS, 2008, 2 (03) : 399 - 409
  • [28] FlowTransformer: A transformer framework for flow-based network intrusion detection systems
    Manocchio, Liam Daly
    Layeghy, Siamak
    Lo, Wai Weng
    Kulatilleke, Gayan K.
    Sarhan, Mohanad
    Portmann, Marius
    EXPERT SYSTEMS WITH APPLICATIONS, 2024, 241
  • [29] Automated Flow-based Rule Generation for Network Intrusion Detection Systems
    Fallahi, Naser
    Sami, Ashkan
    Tajbakhsh, Morteza
    2016 24TH IRANIAN CONFERENCE ON ELECTRICAL ENGINEERING (ICEE), 2016, : 1948 - 1953
  • [30] isAnon: Flow-Based Anonymity Network Traffic Identification Using Extreme Gradient Boosting
    Cai, Zhenzhen
    Jiang, Bo
    Lu, Zhigang
    Liu, Junrong
    Ma, Pingchuan
    2019 INTERNATIONAL JOINT CONFERENCE ON NEURAL NETWORKS (IJCNN), 2019,