• No results found

A Flow-based Method for Abnormal Network Traffic Detection

N/A
N/A
Protected

Academic year: 2021

Share "A Flow-based Method for Abnormal Network Traffic Detection"

Copied!
5
0
0

Loading.... (view fulltext now)

Full text

(1)

A Flow-based Method for Abnormal

Network Traffic Detection

Myung-Sup Kim, Hun-Jeong Kang, Seong-Cheol Hong, Seung-Hwa Chung, and James W. Hong

Dept. of Computer Science and Engineering POSTECH

{mount, bluewind, pluto80, mannam, jwkhong}@postech.ac.kr

Abstract

One recent trend in network security attacks is an increasing number of indirect attacks which influence network traffic negatively, instead of directly entering a system and damaging it. In future, damages from this type of attack are expected to become more serious. In addition, the bandwidth consumption by these attacks influences the entire network performance. This paper presents an abnormal network traffic detecting method and a system prototype. By aggregating packets that belong to the identical flow, we can reduce processing overhead in the system. We suggest a detecting algorithm using changes in traffic patterns that appear during attacks. This algorithm can detect even mutant attacks that use a new port number or changed payload, while signature-based systems are not capable of detecting these types of attacks. Furthermore, the proposed algorithm can identify attacks that cannot be detected by examining only single packet information.

Keywords

Network Security Attack, Abnormal Network Traffic Detection, Traffic Monitoring and Analysis.

1. Introduction

Today, the number of Internet users is continuously increasing, along with new network services. As the internet grows, network security attack threats have become more serious. Many security vulnerabilities are exposed and exploited by attacks. Recent reports on Internet security breaches indicate that the frequency and the damage costs are continuously rising.

One recent network attack trend is the use of network traffic. An attacker places networks or hosts in jeopardy, without intruding into the hosts. The attacks on a famous website, such as Yahoo, E-bay, and E*trade, are good examples [1, 2]. This type of Denial of Service (DoS) and Distributed Denial of Service (DDoS) attacks [3, 4, 5] will cause more damage for the following reasons. There are so many DoS/DDoS tools that even unskilled users can use easily. A successful DoS/DDoS attack shows its impact quickly and makes it difficult to trace back to

(2)

2

the intruder. Moreover, the bandwidth consumption by the attacks influences network performance. Even on highly over-provisioned links, malicious traffic causes an increase in the average DNS latency by 230% and an increase in the average web latency by 30% [6]. From the monitoring result of NG-MON [7], we can observe a more serious latency deficiency (up to 500%) in enterprise networks that contains a target or bypassing machine of the attacks. These menaces require us to make provisions against DoS/DDoS attacks.

This paper focuses on detecting abnormal network traffic which includes those generated by internet worms[6], DoS/DDoS and scanning[24], scanning which include both port and network scanning. We present a detecting method and a system prototype. We analyze network traffic based on flows, which is defined as collections of packets that travel between the same end points [8]. By aggregating packets that belong to the identical flow, we can reduce processing overhead in the system. In addition, we can easily find flow generating system or routers, such as NetFlow [9]. We characterize traffic patterns that appear during attacks. By using these traffic patterns, the proposed method can detect even mutant attacks that use a new port number or forged payload. Additionally, the method will identify attacks that cannot be detected by examining only packet information, by using complete traffic information.

The organization of this paper is as follows. The related work is described in Section 2. Section 3 describes our proposed abnormal traffic detection algorithm. The analysis result of our proposed algorithm is presented in Section 4. In Section 5, we describe a system prototype that implemented our detection algorithm. Finally, concluding remarks are given and possible future work is mentioned in Section 6.

2. Related Work

In this section, we provide a brief overview of scanning and DoS/DDoS attacks. Also, previous approaches to detect these types of attacks are discussed.

Through scanning, an attacker obtains information on a target system. By sending scanning packets to the target, it discovers which systems are working and which services are being offered [10]. DoS/DDoS attacks cause a waste of the resources in the host or networks, and make services work improperly. There are two principal classes of DoS/DDoS, logic and flooding attacks [11].

Logic attacks exploit existing software flaws to cause a malfunction in the system. For instance, in a Ping-of-Death attack [12], oversized ICMP ping packets can result in a denial of service. Also, a Land attack [13] may crash the system by sending packets with the source host and port the same as the destination host and port.

Flooding attacks transmit many spurious packets to the target system, and waste CPU, memory, and network resources. In case of TCP SYN flood [14], the victim receives packets that exceed buffer of the data structure limit and cripple its

(3)
(4)

13

[5] Stefan Savage, David Wetherall, Anna Karlin, and Tom Anderson, “Practical network support for IP traceback,” Proc. of the 2000 ACM SIGCOMM, Stockholm, Sweden, August 2000.

[6] Kun-chan Lan, Alefiya Hussain, and Debojyoti Dutta, “Effect of Malicious Traffic on the Network,” Proc. of PAM 2003, San Diego, California, April 2003.

[7] Se-Hee Han, Myung-Sup Kim, Hong-Taek Ju, and James W. Hong, “The Architecture of NG-MON: A Passive Network Monitoring System,” Lecture Notes in Computer Science 2506, 13th IFIP/IEEE International Workshop on Distributed Systems: Operations and Management (DSOM 2002), Montreal, Canada, October 2002, pp. 16-27.

[8] Siegfried Lifler, “Using Flows for Analysis and Measurement of Internet Traffic,” Diploma Thesis, Istitute of Communication Network and Computer Engineering, University of Stuttgart, Germany, 1997.

[9] Cisco, White Papers, “NetFlow Services and Applications,”

http://www.cisco.com/warp/public/cc/pd/iosw/ioft/neflct/tech/napps_wp.htm. [10] Fyodor, “The Art of Port Scanning,”

http://www.insecure.org/nmap/nmap_doc.html.

[11] D. Moore, G. M. Voelker, and S. Savage, “Inferring Internet Denial-of-Service Activity,” Proc. of USENIX Security Symposium, Washington D.C, Aug 2001.

[12] Common Vulnerabilities and Exposures (CVE), “Ping-of-Death (CVE-1999-0128),” http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0128. [13] Common Vulnerabilities and Exposures (CVE), “Land (CVE-1999-0016),”

http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0016. [14] Common Vulnerabilities and Exposures (CVE), “SYN flood

(CVE-1999-0116),” http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0116. [15] Common Vulnerabilities and Exposures (CVE), “Smurf (CVE-1999-0513),”

http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0513. [16] Common Vulnerabilities and Exposures (CVE), “UDP packet storm

(CVE-1999-0103),” http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0103.

[17] Common Vulnerabilities and Exposures (CVE), “Fraggle (CVE-1999-0514),” http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0514. [18] Common Vulnerabilities and Exposures (CVE), “HTTP request flood

(CVE-1999-0867),” http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0867.

[19] M. Roesch, “Snort - lightweight intrusion detection for networks,” http://www.snort.org.

[20] Rudolf B. Blazek, Hongjoong Kim, Boris Rozovskii, and Alexander Tartakovsky, “A novel approach to detection of denial-of-service attacks via adaptive sequential and batch sequential change-point detection methods,” Pro. of IEEE Systems, Man and Cybernetics Information Assurance Workshop, New York, June 2001.

[21] David K. Y. Yau, John C. S. Lui, and Feng Lian, “Defending against distributed denial-of-service attacks with max-min fair server-centric router

(5)

throttles,” Proc. of IEEE International Workshop on Quality of Service (IWQoS), Miami Beach, Florida, May 2002.

[22] Tao Peng, Christopher Leckie, and Kotagiri Ramamohanarao, “Detecting Distributed Denial of Service Attacks Using Source IP Address Monitoring,” http://www.ee.mu.oz.au/pgrad/taop/research/detection.pdf.

[23] eDonkey, http://www.edonkey2000.com/.

[24] Urupoj Kanlayasiri, Surasak Sanguanpong, and Wipa Jaratmanachot, “A Rule-based Approach for Port Scanning Detection,” Proc. of the 23nd

Electrical Engineering Conference (EECON-23), Chiangmai, Thailand, November 2000.

[25] Welchia Internet Worm,

http://securityresponse.symantec.com/avcenter/venc/data/w32.welchia.worm.h tml.

References

Related documents

Tissue distribution of protein resistant prion protein in variant Creutzfeldt-Jakob disease using a highly sensitive immunoblotting assay... Silveira JR, Raymond GJ, Hughson AG,

By responding to one or more of the questions in this section, the majority (55.4%) of chiro- practic practitioners indicated that they currently employ one or more

The effort to establish a “mid-level” oral health provider in Minnesota began in early 2008 when legislation was introduced to establish the Advanced Dental Hygiene Practitioner

Civil Rights created an environment where the due process rights of college students accused of sexual assault or harassment are being routinely ignored in order to show

Fingerprints of sensitive operations of the evidence trees will be identified as incident identifiers and the evidence tree can provide the contextual information to

 Holds, or is entitled to hold, a gas fitting worker registration restricted to work under technical direction of gas fitting worker ltd to install & commission

Santos GLNG has a four-tiered response structure for managing incidents (including environmental incidents) – the Field Response Team (FRT), the Emergency Response Team (ERT), the

Supporting the whole child Racial equity and hope Community potential Energy and identity Collaboration to support student success Collective impact Equity of opportunity