Detecting network intrusions via a statistical analysis of network packet characteristics

被引:29
作者
Bykova, M [1 ]
Ostermann, S [1 ]
Tjaden, B [1 ]
机构
[1] Ohio Univ, Sch Elect Engn & Comp Sci, Athens, OH 45701 USA
来源
PROCEEDINGS OF THE 33RD SOUTHEASTERN SYMPOSIUM ON SYSTEM THEORY | 2001年
关键词
Intrusion Detection System; suspicious activity; IF; TCP; packet analysis; packet header analysis; network monitoring;
D O I
10.1109/SSST.2001.918537
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With the growing threat of abuse of network resources, it becomes increasingly important to be able to detect malformed packets on a network and estimate the damage they fan came. Carefully constructed, certain type of packets can cause a victim host to crash white other packets may be sent only to gather necessary information about hosts and networks and can he viewed as a prelude to attack. In this paper we collect and analyze ail of the IP and TCP packets seen on a network that either violate existing standards or should not appear in modern internets. Our goal is to determine what these suspicious packets mean and evaluate what proportion of such packets can cause actual damage. Thus, we divide unusual packets obtained during our experiments into several categories depending on the severity or their consequences, including indirect consequences as a result of information gathering, and show the results. The traces analyzed were gathered at Ohio University's main Internet link, providing a massive amount of statistical data.
引用
收藏
页码:309 / 314
页数:6
相关论文
共 18 条
[1]  
[Anonymous], 1994, 1644 RFC
[2]  
[Anonymous], 2000, STATE PRACTICE INTRU
[3]  
[Anonymous], 1994, 1700 RFC
[4]  
*CISC, 2000, NETR INTR DET SYST
[5]  
GULA R, 1999, HANDLE IDENTIFY NETW
[6]  
*INT SEC SYST, 2000, REAL SEC ATT SIGN
[7]  
*INT SEC SYST, REAL SEC
[8]  
JACOBSON V, 1989, TCPDUMP
[9]  
Lyon G F, 1998, PHRACK MAGAZINE, V8
[10]  
MCCANNE S, 1994, LIBPCAP