| Literature DB >> 30252894 |
Markus Ring1, Dieter Landes1, Andreas Hotho2.
Abstract
Frequently, port scans are early indicators of more serious attacks. Unfortunately, the detection of slow port scans in company networks is challenging due to the massive amount of network data. This paper proposes an innovative approach for preprocessing flow-based data which is specifically tailored to the detection of slow port scans. The preprocessing chain generates new objects based on flow-based data aggregated over time windows while taking domain knowledge as well as additional knowledge about the network structure into account. The computed objects are used as input for the further analysis. Based on these objects, we propose two different approaches for detection of slow port scans. One approach is unsupervised and uses sequential hypothesis testing whereas the other approach is supervised and uses classification algorithms. We compare both approaches with existing port scan detection algorithms on the flow-based CIDDS-001 data set. Experiments indicate that the proposed approaches achieve better detection rates and exhibit less false alarms than similar algorithms.Entities:
Mesh:
Year: 2018 PMID: 30252894 PMCID: PMC6156027 DOI: 10.1371/journal.pone.0204507
Source DB: PubMed Journal: PLoS One ISSN: 1932-6203 Impact factor: 3.240
Typical attributes in flow-based data like NetFlow [22] or IPFIX [23].
| # | Attribute | Description |
|---|---|---|
| 1 | Src IP | Source IP Address |
| 2 | Src Port | Source Port |
| 3 | Dest IP | Destination IP Address |
| 4 | Dest Port | Destination Port |
| 5 | Proto | Transport Protocol (e.g. ICMP, TCP, or UDP) |
| 6 | Date first seen | Start time flow first seen |
| 7 | Duration | Duration of the flow |
| 8 | Bytes | Number of transmitted bytes |
| 9 | Packets | Number of transmitted packets |
| 10 | Flags |
Fig 1Proposed workflow for the detection of slow port scans.
Attributes within a network event.
| # | Name | Description |
|---|---|---|
| 1 | IP | IP Address |
| 2 | ICMP-Error count | The number of received ICMP Errors |
| 3 | RST count | The number of received RST flags from different |
| 4 | RwA count | The number of addressed |
| 5 | NeIP count | The number of flows to non-existing internal IP Addresses |
| 6 | NeTCP count | The number of flows to non-existing internal TCP-Services |
| 7 | Succession count | Counts how often this |
The table delineates known internal IP Addresses and known open TCP ports for the exemplary network.
| Known internal IP Addresses | Known open TCP ports |
|---|---|
| 192.168.100.5 | 192.168.100.5 Port 80 |
| 192.168.100.6 | 192.168.100.6 Port 22 |
| 192.168.100.15 | 192.168.100.5 Port 443 |
| 192.168.220.16 |
The table contains the collected flows for a specific time window for the exemplary network.
| # | Proto | SrcIP | SrcPt | DstIP | DstPt | TCP flags |
|---|---|---|---|---|---|---|
| 1 | TCP | 192.168.100.5 | 80 | 192.168.220.16 | 53321 | .A…. |
| 2 | TCP | 192.168.220.16 | 53333 | 192.168.100.5 | 80 | .A..S. |
| 3 | TCP | 192.168.100.5 | 80 | 192.168.220.16 | 53333 | .A..S. |
| 4 | TCP | 8.8.8.8 | 80 | 192.168.220.16 | 47898 | …R.. |
| 5 | TCP | 192.168.100.5 | 80 | 192.168.220.16 | 53333 | …R.. |
| 6 | TCP | 192.168.100.5 | 80 | 192.168.220.16 | 53321 | …R.. |
| 7 | TCP | 192.168.220.16 | 53337 | 192.168.100.5 | 22 | ….S. |
| 8 | TCP | 192.168.220.16 | 53338 | 192.168.100.5 | 22 | ….S. |
| 9 | TCP | 192.168.220.16 | 53339 | 192.168.100.5 | 23 | ….S. |
| 10 | TCP | 192.168.100.5 | 22 | 192.168.220.16 | 53337 | …R.. |
| 11 | TCP | 192.168.100.5 | 22 | 192.168.220.16 | 53338 | …R.. |
| 12 | TCP | 192.168.100.5 | 23 | 192.168.220.16 | 53339 | …R.. |
| 13 | TCP | 192.168.220.16 | 53340 | 192.168.100.15 | 443 | ….S. |
| 14 | TCP | 192.168.220.16 | 53341 | 192.168.100.15 | 443 | ….S. |
| 15 | TCP | 192.168.220.16 | 53342 | 192.168.100.15 | 443 | ….S. |
| 16 | TCP | 192.168.220.16 | 53343 | 192.168.100.15 | 22 | ….S. |
| 17 | ICMP | 192.168.220.16 | 0 | 192.168.220.44 | 8.0 | …… |
| 18 | ICMP | 192.168.220.1 | 0 | 192.168.220.16 | 3.1 | …… |
| 19 | UDP | 192.168.220.16 | 34345 | 192.168.100.5 | 53 | …… |
| 20 | ICMP | 192.168.100.5 | 0 | 192.168.220.16 | 3.3 | …… |
Port scans within the CIDDS-001 data set.
| Parameter | week1 | week2 |
|---|---|---|
| T = 1 | 7 | 6 |
| T = 2 | 10 | 7 |
| T = 3 | 9 | 1 |
| Sum | 26 | 14 |
Results of the experiment.
The table shows the number of detected port scans as well as the number of false alarms for the different algorithms in week1 and week2. Week1 contains 26 port scans and week2 contains 14 port scans.
| Approach | week1 | week2 | ||
|---|---|---|---|---|
| Detected attacks | False alarms | Detected attacks | False alarms | |
| TFDS (default) | 6 | 35 | 2 | 16 |
| TFDS (optimized) | 9 | 29 | 4 | 8 |
| TRW-SYN (default) | 15 | 1685 | 8 | 7495 |
| TRW-SYN (optimized) | 14 | 78 | 7 | 118 |
| UPSD maxDect | 1 | 2 | ||
| UPSD minFP | 25 | |||
| SPSD with DecisionTree | 8 | |||
| SPSD with SVM | ||||
| Webster | 22 | 6 | ||