2008
DOI: 10.1109/tnet.2007.911438
|View full text |Cite
|
Sign up to set email alerts
|

Internet Traffic Behavior Profiling for Network Security Monitoring

Abstract: Abstract-Recent spates of cyber-attacks and frequent emergence of applications affecting Internet traffic dynamics have made it imperative to develop effective techniques that can extract, and make sense of, significant communication patterns from Internet traffic data for use in network operations and security management. In this paper, we present a general methodology for building comprehensive behavior profiles of Internet backbone traffic in terms of communication patterns of end-hosts and services. Relyin… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
5
0

Year Published

2011
2011
2023
2023

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 82 publications
(5 citation statements)
references
References 29 publications
0
5
0
Order By: Relevance
“…The adversary may also discover compromised clients or hosts (by worms, viruses, etc.) based on traffic patterns [69,70] and select targets for future attacks. An A2 adversary can profile clients and track their activity only based on IP [42,71,73], even without cookies or when privacy browsing is being used.…”
Section: Threat Modelmentioning
confidence: 99%
See 1 more Smart Citation
“…The adversary may also discover compromised clients or hosts (by worms, viruses, etc.) based on traffic patterns [69,70] and select targets for future attacks. An A2 adversary can profile clients and track their activity only based on IP [42,71,73], even without cookies or when privacy browsing is being used.…”
Section: Threat Modelmentioning
confidence: 99%
“…Clients in an enterprise network (e.g., campus, corporate, or access network) are exposed to many attacks that threaten their privacy in today's connected world. For example, an Internet Protocol (IP) address can be used to identify a client and device communicating on the Internet, enabling client activity and location tracking [13,27,42,48,53,[69][70][71]73]. The problem will become more severe as enterprise networks adopt IPv6, where each client may get a persistent, publicly-routable IPv6 address that makes it easier for an adversary to locate a client and analyze its traffic [13,27,53].…”
Section: Introductionmentioning
confidence: 99%
“…In [26], entropy was used for profiling per-host behaviour in Internet traffic. Each of the source and destination IP addresses and ports was aggregated and the entropies of the three remaining features gave a three-dimensional entropy space with a total of 27 behaviour clusters.…”
Section: Related Workmentioning
confidence: 99%
“…At this point, we will generalize the concept of the in-degree and out-degree features, used in [26] [32], which is defined by a total number of distinct source hosts per each destination host and a total number of distinct destination hosts per each source host, labelled as S[D] and D[S], respectively. Taking into consideration any other identifying features that are not used in the aggregation key, such as source and destination ports, we can additionally count the distinct occurrence of these features per aggregated element.…”
Section: Flow Feature Selectionmentioning
confidence: 99%
“…As it is said in [7], a habitual traffic profile, called baseline, is present in communication networks. Different kind of attacks present deviations from this baseline and these features could be used to detect certain anomalies in traffic behavior (DoS [8], DDoS [9], brute force attacks [10]).…”
Section: Introductionmentioning
confidence: 99%