12.07.2015 Views

NETWORK TRAFFIC FLOW ANALYSIS - NM Lab at Korea Univ.

NETWORK TRAFFIC FLOW ANALYSIS - NM Lab at Korea Univ.

NETWORK TRAFFIC FLOW ANALYSIS - NM Lab at Korea Univ.

SHOW MORE
SHOW LESS
  • No tags were found...

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

flows. In this work, much of the effort so far has beenconcentr<strong>at</strong>ed on identifying meaningful flow <strong>at</strong>tributes.Preliminary assessment indic<strong>at</strong>es the proof-of-concept toolis useful as is, and may lead, with further research, to anumber of applic<strong>at</strong>ions.Mechanisms th<strong>at</strong> allow us to infer the true n<strong>at</strong>ure ofinform<strong>at</strong>ion flows based on traffic behaviour can be used toincrease the level of confidence in the monitoring tools and inour networks. We believe th<strong>at</strong> the flow fe<strong>at</strong>ures derived duringthis study will prove to be useful to other researchers in thefield.References[1] J. P. Early, C. E. Brodley, C. Rosenberg, “BehavioralAuthentic<strong>at</strong>ion of Server Flows”, Proc. of the AnnualComputer Security Applic<strong>at</strong>ions Conference (ACSAC2003), Las Vagas, NV, USA, December 2003.[2] M. Roughan, S. Sen, O. Sp<strong>at</strong>scheck, N. G. Duffield,“Class-of-service mapping for QoS: a st<strong>at</strong>istical sign<strong>at</strong>urebasedapproach to IP traffic classific<strong>at</strong>ion”, Proc of theConference on internet Measurement (IMC 04), pp. 135-148, Taormina, Sicily, Italy, October 2004.[3] T. Karagiannis, K. Papagiannaki and M. Faloutsos,“BLINC: Multilevel Traffic Classific<strong>at</strong>ion in the Dark”,Proc. of ACM SIGCOMM, pp. 229-240, Philadelphia, PA,USA, August 2005.[4] K. Xu, Z. Zhang, and S. Bh<strong>at</strong>tacharya. “Profiling InternetBackbone Traffic: Behavior Models and Applic<strong>at</strong>ions”,Proc. of ACM SIGCOMM, pp. 169-180, Philadelphia, PA,USA, August 2005.[5] A. W. Moore and D. Zuev. “Internet Traffic Classific<strong>at</strong>ionUsing Bayesian Analysis Techniques”, Proc. of ACMSIGMETRICS, pp. 50-60, Banff, Alberta, Canada, June,2005.[6] W. Lee, S.J. Stolfo, “A Framework for ConstructingFe<strong>at</strong>ures and Models for Intrusion Detection Systems”,ACM Transactions on Inform<strong>at</strong>ion and System Security,Vol. 3 No. 4, November, 2000.[7] S. Abdulrahman “Network Intrusion Detection UsingFlow Characteriz<strong>at</strong>ion,” project description,http://www.cs.utk.edu/~abdulrah/project/paper.html[8] T. Dunigan, G. Ostrouchov, “Flow Characteriz<strong>at</strong>ion forIntrusion Detection”, Oak Ridge N<strong>at</strong>ional <strong>Lab</strong>or<strong>at</strong>oryreport, ORNL/TM-2001/115, November 2000, available <strong>at</strong>http://www.csm.ornl.gov/~dunigan/pubs.html[9] Y. Zhang and V. Paxson, “Detecting Backdoors”, Proc. ofUSENIX Security Symposium, Denver, CO, USA, August2000.[10] F. Hernández-Campos, A. B. Nobel, F. Donelson Smith,K. Jeffay, “Understanding P<strong>at</strong>terns of TCP ConnectionUsage with St<strong>at</strong>istical Clustering”, Proc. of theSymposium on Modeling, Analysis, and Simul<strong>at</strong>ion ofComputer and Telecommunic<strong>at</strong>ion Systems (MASCOTS),pp. 35-44, Atlanta, GA, USA, September 2005.[11] DARPA Intrusion Detection Evalu<strong>at</strong>ion, Lincoln<strong>Lab</strong>or<strong>at</strong>ory, http://www.ll.mit.edu/IST/ideval/[12] Annie De Montigny-Leboeuf, “Flow Attributes For UseIn Traffic Characteriz<strong>at</strong>ion,” CRC Technical Note CRC-TN-2005-003, December 2005[13] C. Daicos, G.S. Knight, “Concerning Enterprise NetworkVulnerability To Http Tunnelling”, Proc. of IFIP TC1118th Intern<strong>at</strong>ional Conference on Inform<strong>at</strong>ion Security(IFIP SEC 2003), Athens, Greece, May 2003.[14]Httptunnel, a HTTP tunnel tool, available <strong>at</strong>http://www.nocrew.org/software/httptunnel.html[15] Httport, a HTTP tunnel tool, available <strong>at</strong>http://www.htthost.com/642

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!