Detecting exploit patterns from network packet streams

dc.contributor.advisor Srikanta Tirthapura
dc.contributor.advisor Yong Guan
dc.contributor.author Lahiri, Bibudh
dc.contributor.department Department of Electrical and Computer Engineering
dc.date 2018-08-11T22:06:40.000
dc.date.accessioned 2020-06-30T02:42:14Z
dc.date.available 2020-06-30T02:42:14Z
dc.date.copyright Sun Jan 01 00:00:00 UTC 2012
dc.date.embargo 2013-06-05
dc.date.issued 2012-01-01
dc.description.abstract <p>Network-based Intrusion Detection Systems (NIDS), e.g., Snort, Bro or NSM, try to detect malicious network activity such as Denial of Service (DoS) attacks and port scans by monitoring network traffic. Research from network traffic measurement has identified various patterns that exploits on today's Internet typically exhibit. However, there has not been any significant attempt, so far, to design algorithms with provable guarantees for detecting exploit patterns from network traffic packets. In this work, we develop and apply data streaming algorithms to detect exploit patterns from network packet streams.</p> <p>In network intrusion detection, it is necessary to analyze large volumes of data in an online fashion. Our work addresses scalable analysis of data under the following situations. (1) Attack traffic can be stealthy in nature, which means detecting a few covert attackers might call for checking traffic logs of days or even months, (2) Traffic is multidimensional and correlations between multiple dimensions maybe important, and (3) Sometimes traffic from multiple sources may need to be analyzed in a combined manner. Our algorithms offer provable bounds on resource consumption and approximation error. Our theoretical results are supported by experiments over real network traces and synthetic datasets.</p>
dc.format.mimetype application/pdf
dc.identifier archive/lib.dr.iastate.edu/etd/12374/
dc.identifier.articleid 3381
dc.identifier.contextkey 3437740
dc.identifier.doi https://doi.org/10.31274/etd-180810-2263
dc.identifier.s3bucket isulib-bepress-aws-west
dc.identifier.submissionpath etd/12374
dc.identifier.uri https://dr.lib.iastate.edu/handle/20.500.12876/26563
dc.language.iso en
dc.source.bitstream archive/lib.dr.iastate.edu/etd/12374/Lahiri_iastate_0097E_12511.pdf|||Fri Jan 14 19:19:41 UTC 2022
dc.subject.disciplines Computer Engineering
dc.subject.disciplines Computer Sciences
dc.subject.keywords Approximation algorithms
dc.subject.keywords Data streams
dc.subject.keywords Network monitoring
dc.title Detecting exploit patterns from network packet streams
dc.type dissertation
dc.type.genre dissertation
dspace.entity.type Publication
relation.isOrgUnitOfPublication a75a044c-d11e-44cd-af4f-dab1d83339ff
thesis.degree.level dissertation
thesis.degree.name Doctor of Philosophy
File
Original bundle
Now showing 1 - 1 of 1
No Thumbnail Available
Name:
Lahiri_iastate_0097E_12511.pdf
Size:
853.59 KB
Format:
Adobe Portable Document Format
Description: