2018 IEEE International Conference on Intelligence and Security Informatics (ISI) 2018
DOI: 10.1109/isi.2018.8587323
|View full text |Cite
|
Sign up to set email alerts
|

Exploratory Data Analysis of a Network Telescope Traffic and Prediction of Port Probing Rates

Abstract: Understanding the properties exhibited by large scale network probing traffic would improve cyber threat intelligence. In addition, the prediction of probing rates is a key feature for security practitioners in their endeavors for making better operational decisions and for enhancing their defense strategy skills. In this work, we study different aspects of the traffic captured by a /20 network telescope. First, we perform an exploratory data analysis of the collected probing activities. The investigation incl… Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
10
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
4
2

Relationship

1
5

Authors

Journals

citations
Cited by 9 publications
(10 citation statements)
references
References 7 publications
0
10
0
Order By: Relevance
“…3) The performance of the prediction models are evaluated on the most targeted services using more than 300 days of probing traffic (more than 1.5 TB of data). We show that the probing rates are predictable with an average coefficient of determination R 2 ranging between 0.70 and 0.83, surpassing for most of the network services the performance of autoregressive-based models [14]. Also, we show that the information carried by the semantic similarity between ports contributes in defining an improved feature space which positively impacts the performance of the prediction model.…”
Section: Introductionmentioning
confidence: 84%
See 2 more Smart Citations
“…3) The performance of the prediction models are evaluated on the most targeted services using more than 300 days of probing traffic (more than 1.5 TB of data). We show that the probing rates are predictable with an average coefficient of determination R 2 ranging between 0.70 and 0.83, surpassing for most of the network services the performance of autoregressive-based models [14]. Also, we show that the information carried by the semantic similarity between ports contributes in defining an improved feature space which positively impacts the performance of the prediction model.…”
Section: Introductionmentioning
confidence: 84%
“…In relation with predictive models leveraging darknet traffic, the authors in [14] used the vector autoregressive model to predict the probing rates at the port level. Their approach for training the model consists in adapting the learning process to overcome the issue of the non-stationarity of the autoregressive model's parameters over time.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Zakroum and their team observed that more than 80% of network probers target less than five ports in the whole darknet space most attacked ports SSH (22), RDP (3389), MySQL (3306) and FTP (21) while focusing on the HTTP (80) server (Zakroum et al , 2018).…”
Section: Related Workmentioning
confidence: 99%
“…Where non-stationary VAR model consistently produces better results for services exhibiting high probing rate variability. More details could be found in the paper (Zakroum et al, 2018).…”
Section: Prediction Attack Ratesmentioning
confidence: 99%