Detecting exploit patterns from network packet streams
dc.contributor.advisor | Srikanta Tirthapura | |
dc.contributor.advisor | Yong Guan | |
dc.contributor.author | Lahiri, Bibudh | |
dc.contributor.department | Department of Electrical and Computer Engineering | |
dc.date | 2018-08-11T22:06:40.000 | |
dc.date.accessioned | 2020-06-30T02:42:14Z | |
dc.date.available | 2020-06-30T02:42:14Z | |
dc.date.copyright | Sun Jan 01 00:00:00 UTC 2012 | |
dc.date.embargo | 2013-06-05 | |
dc.date.issued | 2012-01-01 | |
dc.description.abstract | <p>Network-based Intrusion Detection Systems (NIDS), e.g., Snort, Bro or NSM, try to detect malicious network activity such as Denial of Service (DoS) attacks and port scans by monitoring network traffic. Research from network traffic measurement has identified various patterns that exploits on today's Internet typically exhibit. However, there has not been any significant attempt, so far, to design algorithms with provable guarantees for detecting exploit patterns from network traffic packets. In this work, we develop and apply data streaming algorithms to detect exploit patterns from network packet streams.</p> <p>In network intrusion detection, it is necessary to analyze large volumes of data in an online fashion. Our work addresses scalable analysis of data under the following situations. (1) Attack traffic can be stealthy in nature, which means detecting a few covert attackers might call for checking traffic logs of days or even months, (2) Traffic is multidimensional and correlations between multiple dimensions maybe important, and (3) Sometimes traffic from multiple sources may need to be analyzed in a combined manner. Our algorithms offer provable bounds on resource consumption and approximation error. Our theoretical results are supported by experiments over real network traces and synthetic datasets.</p> | |
dc.format.mimetype | application/pdf | |
dc.identifier | archive/lib.dr.iastate.edu/etd/12374/ | |
dc.identifier.articleid | 3381 | |
dc.identifier.contextkey | 3437740 | |
dc.identifier.doi | https://doi.org/10.31274/etd-180810-2263 | |
dc.identifier.s3bucket | isulib-bepress-aws-west | |
dc.identifier.submissionpath | etd/12374 | |
dc.identifier.uri | https://dr.lib.iastate.edu/handle/20.500.12876/26563 | |
dc.language.iso | en | |
dc.source.bitstream | archive/lib.dr.iastate.edu/etd/12374/Lahiri_iastate_0097E_12511.pdf|||Fri Jan 14 19:19:41 UTC 2022 | |
dc.subject.disciplines | Computer Engineering | |
dc.subject.disciplines | Computer Sciences | |
dc.subject.keywords | Approximation algorithms | |
dc.subject.keywords | Data streams | |
dc.subject.keywords | Network monitoring | |
dc.title | Detecting exploit patterns from network packet streams | |
dc.type | dissertation | |
dc.type.genre | dissertation | |
dspace.entity.type | Publication | |
relation.isOrgUnitOfPublication | a75a044c-d11e-44cd-af4f-dab1d83339ff | |
thesis.degree.level | dissertation | |
thesis.degree.name | Doctor of Philosophy |
File
Original bundle
1 - 1 of 1
No Thumbnail Available
- Name:
- Lahiri_iastate_0097E_12511.pdf
- Size:
- 853.59 KB
- Format:
- Adobe Portable Document Format
- Description: