Abstract
Stealthy attackers move patiently through computer networks – taking days, weeks or months to accomplish their objectives in order to avoid detection. As networks scale up in size and speed, monitoring for such attack attempts is increasingly a challenge. This paper presents an efficient monitoring technique for stealthy attacks. It investigates the feasibility of proposed method under number of different test cases and examines how design of the network affects the detection. A methodological way for tracing anonymous stealthy activities to their approximate sources is also presented. The Bayesian fusion along with traffic sampling is employed as a data reduction method. The proposed method has the ability to monitor stealthy activities using 10–20% size sampling rates without degrading the quality of detection.
Publisher statement: NOTICE: this is the author’s version of a work that was accepted for publication in Computers & Electrical Engineering. Changes resulting from the publishing process, such as peer review, editing, corrections, structural formatting, and other quality control mechanisms may not be reflected in this document. Changes may have been made to this work since it was submitted for publication. A definitive version was subsequently published in Computers & Electrical Engineering, [VOL 47, (2015)] DOI: 10.1016/j.compeleceng.2015.07.007.
© 2015, Elsevier. Licensed under the Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International http://creativecommons.org/licenses/by-nc-nd/4.0/
Original language | English |
---|---|
Pages (from-to) | 327–344 |
Journal | Computers & Electrical Engineering |
Volume | 47 |
Early online date | 18 Jul 2015 |
DOIs | |
Publication status | Published - Oct 2015 |
Bibliographical note
NOTICE: this is the author’s version of a work that was accepted for publication in Computers & Electrical Engineering. Changes resulting from the publishing process, such as peer review, editing, corrections, structural formatting, and other quality control mechanisms may not be reflected in this document. Changes may have been made to this work since it was submitted for publication. A definitive version was subsequently published in Computers & Electrical Engineering, [VOL 47, (2015)] DOI: 10.1016/j.compeleceng.2015.07.007.© 2015, Elsevier. Licensed under the Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International http://creativecommons.org/licenses/by-nc-nd/4.0/
Keywords
- Stealthy attacks
- Bayesian fusion
- Network simulation
- Traffic sampling
- Anomaly detection