Detecting Exploit Patterns from Network Flow Streams
نویسندگان
چکیده
An Intrusion Detection System (IDS) is a piece of software and/or hardware designed to detect unwanted attempts at accessing, manipulating, and disabling of computer systems, through a network such as the Internet. Network-based Intrusion Detection Systems (NIDS) try to detect malicious activities by monitoring network traffic. Research on network traffic measurement has identified various patterns that the typical exploits on today’s Internet exhibit. The goal of our research is to devise single-pass (online) data stream algorithms for detecting these patterns from network traffic flow data, using a workspace that is much smaller than the size of the traffic flow. We aim to design algorithms with a provable guarantee on the space and time requirements and the degree of approximation in the estimates returned.
منابع مشابه
Patterns of flow evolution in the central area of the Romanian Plain, Case study: the Calnistea Catchment (Romania)
This paper seeks to emphasize the flow variability in the Calnistea catchment by analyzing the local physiographic factors. The research has shown that the amount of precipitation that falls to the ground is low, the rocks in the region are soft, but highly permeable, gradients are gentle in most of the territory and vegetal cover is sparse and therefore cannot hold important amounts of water. ...
متن کاملDetecting Privilege-Escalating Executable Exploits
The Lincoln Laboratory Malicious Code Detector (LIMACODE) is a system for statically detecting privilege-escalating exploits in data streams, such as files and network traffic. LIMACODE operates as follows: it scans data streams, identifies the language of the stream, then extracts language-specific features for input to a feed-forward neural network classifier which labels the stream as either...
متن کاملReal-Time End-to-End Action Detection with Two-Stream Networks
Two-stream networks have been very successful for solving the problem of action detection. However, prior work using two-stream networks train both streams separately, which prevents the network from exploiting regularities between the two streams. Moreover, unlike the visual stream, the dominant forms of optical flow computation typically do not maximally exploit GPU parallelism. We present a ...
متن کاملAdaptive Thresholds: Monitoring Streams of Network Counts Online
This paper describes a fast, statistically principled method for monitoring streams of network counts, which have long-term trends, rough cyclical patterns, outliers and missing data. The key step is to build a reference (predictive) model for the counts that captures their complex, salient features but has just a few parameters that can be kept up-to-date as the counts flow by, without requiri...
متن کاملAdaptive Thresholds: Monitoring Streams of Network Counts
This article describes a fast, statistically principled method for monitoring streams of network counts, which have long-term trends, rough cyclical patterns, outliers, and missing data. The key step is to build a reference (predictive) model for the counts that captures their complex, salient features but has just a few parameters that can be kept up-to-date as the counts flow by, without requ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2008