Large-Scale Monitoring for Cyber Attacks by Using Cluster Information on Darknet Traffic Features
Author(s) -
Hironori Nishikaze,
Seiichi Ozawa,
Jun Kitazono,
Tao Ban,
Junji Nakazato,
Jumpei Shimamura
Publication year - 2015
Publication title -
procedia computer science
Language(s) - English
Resource type - Journals
SCImago Journal Rank - 0.334
H-Index - 76
ISSN - 1877-0509
DOI - 10.1016/j.procs.2015.07.292
Subject(s) - computer science , subnet , network packet , cluster analysis , the internet , malware , scale (ratio) , data mining , computer network , vulnerability (computing) , feature (linguistics) , computer security , real time computing , artificial intelligence , world wide web , physics , quantum mechanics , linguistics , philosophy
This paper presents a machine learning approach to large-scale monitoring for malicious activities on Internet. In the proposed system, network packets sent from a subnet to a darknet (i.e., a set of unused IPs) are collected, and they are transformed into 27-dimensional TAP (Traffic Analysis Profile) feature vectors. Then, a hierarchical clustering is performed to obtain clusters for typical malicious behaviors. In the monitoring phase, the malicious activities in a subnet are estimated from the closest TAP feature cluster. Then, such TAP feature clusters for all subnets are visualized on the proposed monitoring system in real time. In the experiment, we use a big data set of 303,733,994 darknet packs collected from February 1st to February 28th, 2014 (28 days) for monitoring. As a result, we can successfully detect an indication of the pandemic of a new malware, which attacked to the vulnerability of Synology NAS (port 5,000/TCP)
Accelerating Research
Robert Robinson Avenue,
Oxford Science Park, Oxford
OX4 4GP, United Kingdom
Address
John Eccles HouseRobert Robinson Avenue,
Oxford Science Park, Oxford
OX4 4GP, United Kingdom