skip to main content
10.1145/1080173.1080176acmconferencesArticle/Chapter ViewAbstractPublication PagescommConference Proceedingsconference-collections
Article
Free access

Detecting malicious network traffic using inverse distributions of packet contents

Published: 22 August 2005 Publication History

Abstract

We study the problem of detecting malicious IP traffic in the network early, by analyzing the contents of packets. Existing systems look at packet contents as a bag of substrings and study characteristics of its base distribution B where B(i) is the frequency of substring i.We propose studying the inverse distribution I where I(f) is the number of substrings that appear with frequency f. As we show using a detailed case study, the inverse distribution shows the emergence of malicious traffic very clearly not only in its "static" collection of bumps, but also in its nascent "dynamic" state when the phenomenon manifests itself only as a distortion of the inverse distribution envelope. We describe our probabilistic analysis of the inverse distribution in terms of Gaussian mixtures, our preliminary solution for discovering these bumps automatically. Finally, we briefly discuss challenges in analyzing the inverse distribution of IP contents and its applications.

References

[1]
A. Z. Broder, S. C. Glassman, M. S. Manasse, and G. Zweig. Syntactic clustering of the web. In Proc. WWW Conf., 1997.
[2]
G. Cormode, F. Korn, S. Muthukrishnan, and D. Srivastava. Diamonds in the rough: Finding hierarchical heavy hitters in multidimensional data. In Proc. SIGMOD, 2004.
[3]
M. Datar and S. Muthukrishnan. Computing rarity and similarity over data streams. In Proceedings ESA, 2002.
[4]
R. Duda, P. Hart, and D. Stork. Pattern Classification. Wiley Interscience, 2nd Edition, 2000.
[5]
C. Estan and G. Varghese. New directions in traffic measurement and accounting. In Proc. ACM SIGCOMM Internet Measurement Workshop, 2001.
[6]
M. A. T. Figueiredo and A. K. Jain. Unsupervised learning of finite mixture models. IEEE Trans. Pattern Analysis and Machine Intelligence, 24(3):381--396, 2002.
[7]
J. Jung, V. Paxson, A. W. Berger, and H. Balakrishnan. Fast portscan detection using sequential hypothesis testing. In Proc. IEEE Security and Privacy, 2004.
[8]
J. O. Kephart and W. C. Arnold. Automatic extraction of computer virus signatures. In Proc. 4th Intl. Virus Bulletin Conf., 2001.
[9]
H. A. Kim and B. Karp. Autograph: Toward automatic distributed worm signature detection. In Proc. USENIX Security Symp., 2004.
[10]
K. Levchenko, R. Paturi, and G. Varghese. On the difficulty of scalably detecting network attacks. In Proc. ACM Symp. on Computer and Communication Security, 2004.
[11]
G. Manku and R. Motwani. Approximate frequency counts over data streams. In Proc. VLDB, 2002.
[12]
S. Muthukrishnan. Data stream algorithms and applications. Url: http://www.cs.rutgers.edu/~muthu/stream-1-1.ps.
[13]
J. Newsome, B. Karp, and D. Song. Polygraph: Automatically generating signatures for polymorphic worms. In Proc. IEEE Security and Privacy, 2005.
[14]
S. Sen, O. Spatscheck, and D. Wang. Accurate, scalable in-network identification of P2P traffic using application signatures. In Proc. WWW Conf., 2004.
[15]
S. Singh, C. Estan, G. Varghese, and S. Savage. Automated worm fingerprinting. In Proc. OSDI, 2004.

Cited By

View all

Index Terms

  1. Detecting malicious network traffic using inverse distributions of packet contents

      Recommendations

      Comments

      Information & Contributors

      Information

      Published In

      cover image ACM Conferences
      MineNet '05: Proceedings of the 2005 ACM SIGCOMM workshop on Mining network data
      August 2005
      296 pages
      ISBN:1595930264
      DOI:10.1145/1080173
      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Sponsors

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      Published: 22 August 2005

      Permissions

      Request permissions for this article.

      Check for updates

      Author Tags

      1. content analysis
      2. inverse distribution
      3. worms

      Qualifiers

      • Article

      Conference

      SIGCOMM05
      Sponsor:
      SIGCOMM05: ACM SIGCOMM 2005 Conference
      August 26, 2005
      Pennsylvania, Philadelphia, USA

      Contributors

      Other Metrics

      Bibliometrics & Citations

      Bibliometrics

      Article Metrics

      • Downloads (Last 12 months)70
      • Downloads (Last 6 weeks)11
      Reflects downloads up to 06 Nov 2024

      Other Metrics

      Citations

      Cited By

      View all

      View Options

      View options

      PDF

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader

      Get Access

      Login options

      Media

      Figures

      Other

      Tables

      Share

      Share

      Share this Publication link

      Share on social media