Understanding Increasing Traffic Levels for Internet Abuse Detection

被引:0
|
作者
P Sandford
D J Parish
J M Sandford
机构
[1] Loughborough University,Department of Electronic and Electrical Engineering
关键词
data mining; network security; internet crime; case-based reasoning;
D O I
10.1057/palgrave.sj.8350051
中图分类号
学科分类号
摘要
Internet misuse is a serious concern which undermines the burgeoning e-business environment. Several mature technologies exist for combating Internet misuse at the edges of the Internet, but certain classes of misuse can only be effectively prevented within the network core. Unfortunately, as communication data rates increase, it becomes increasingly difficult to process all the network traffic using conventional approaches. This paper discusses mechanisms to overcome this problem based on processing summaries of network traffic, rather than individual packets. An experimental implementation of the approach is described, and its integration with advanced processing tools to identify abuse situations is discussed. In the approach, packets are captured from the network and summaries of specific characteristics of the headers are generated. These are then analysed using data mining tools in order to identify abuse or unusual characteristics. The results of the analysis phase can then be used to refine the summarization process both to improve efficiency and to provide a means of responding to new threats.
引用
收藏
页码:63 / 76
页数:13
相关论文
共 50 条
  • [1] Understanding Traffic Safety Culture Implications for Increasing Traffic Safety
    Islam, Md Tazul
    Thue, Laura
    Grekul, Jana
    [J]. TRANSPORTATION RESEARCH RECORD, 2017, (2635) : 79 - 89
  • [2] Detection of Traffic Discrimination in the Internet
    Khandkar, Vinod S.
    Hanawal, Manjesh K.
    [J]. 2020 INTERNATIONAL CONFERENCE ON COMMUNICATION SYSTEMS & NETWORKS (COMSNETS), 2020,
  • [3] Early Detection of Increasing Traffic with Distributed Traffic Measurement
    Fukushima, Yukinobu
    Niboshi, Mamoru
    Murase, Tutomu
    Fujimaki, Ryohei
    Hirose, Shunsuke
    Yokohira, Tokumi
    [J]. TENCON 2010: 2010 IEEE REGION 10 CONFERENCE, 2010, : 809 - 814
  • [4] A Robust Internet Abuse Detection Method
    Fa, Zhou
    Geng, Guang-Gang
    Yan, Zhi-Wei
    Lee, Xiao-Dong
    [J]. 2017 IEEE INTERNATIONAL CONFERENCE ON BIG DATA (BIG DATA), 2017, : 1712 - 1715
  • [5] Understanding Internet traffic streams: Dragonflies and tortoises
    Brownlee, N
    Claffy, KC
    [J]. IEEE COMMUNICATIONS MAGAZINE, 2002, 40 (10) : 110 - 117
  • [6] A text mining approach to Internet abuse detection
    Chen-Huei Chou
    Atish P. Sinha
    Huimin Zhao
    [J]. Information Systems and e-Business Management, 2008, 6 : 419 - 439
  • [7] A text mining approach to Internet abuse detection
    Chou, Chen-Huei
    Sinha, Atish P.
    Zhao, Huimin
    [J]. INFORMATION SYSTEMS AND E-BUSINESS MANAGEMENT, 2008, 6 (04) : 419 - 439
  • [8] Editorial: Domestic violence and abuse: increasing global and intersectional understanding
    Myall, Michelle
    Morgan, Sara
    Scott, Steph
    [J]. FRONTIERS IN HEALTH SERVICES, 2024, 4
  • [9] Dynamic Modeling of Internet Traffic for Intrusion Detection
    Khushboo Shah
    Edmond Jonckheere
    Stephan Bohacek
    [J]. EURASIP Journal on Advances in Signal Processing, 2007
  • [10] Dynamic modeling of Internet traffic for intrusion detection
    Shah, Khushboo
    Jonckheere, Edmond
    Bohacek, Stephan
    [J]. EURASIP JOURNAL ON ADVANCES IN SIGNAL PROCESSING, 2007, 2007 (1)