WO2001084774A2 - Characterizing network traffic from packet parameters - Google Patents
Characterizing network traffic from packet parameters Download PDFInfo
- Publication number
- WO2001084774A2 WO2001084774A2 PCT/CA2001/000596 CA0100596W WO0184774A2 WO 2001084774 A2 WO2001084774 A2 WO 2001084774A2 CA 0100596 W CA0100596 W CA 0100596W WO 0184774 A2 WO0184774 A2 WO 0184774A2
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- dimensional
- received
- dimensional vector
- region
- vector
- Prior art date
Links
- 238000000034 method Methods 0.000 claims abstract description 75
- 239000013598 vector Substances 0.000 claims description 140
- 239000011159 matrix material Substances 0.000 claims description 45
- 238000012549 training Methods 0.000 claims description 43
- 230000001131 transforming effect Effects 0.000 claims description 19
- 238000000354 decomposition reaction Methods 0.000 claims description 11
- 230000008569 process Effects 0.000 abstract description 16
- 238000001514 detection method Methods 0.000 abstract description 13
- 238000013507 mapping Methods 0.000 abstract description 9
- 238000013459 approach Methods 0.000 abstract description 6
- 230000002159 abnormal effect Effects 0.000 description 13
- 238000012512 characterization method Methods 0.000 description 7
- 230000004044 response Effects 0.000 description 6
- 238000004891 communication Methods 0.000 description 5
- 230000006870 function Effects 0.000 description 5
- 230000003993 interaction Effects 0.000 description 5
- 230000009466 transformation Effects 0.000 description 4
- 230000008859 change Effects 0.000 description 3
- 238000004458 analytical method Methods 0.000 description 2
- 239000003999 initiator Substances 0.000 description 2
- 238000012552 review Methods 0.000 description 2
- 238000012360 testing method Methods 0.000 description 2
- 240000005020 Acaciella glauca Species 0.000 description 1
- 241000657949 Elderberry carlavirus D Species 0.000 description 1
- 238000006424 Flood reaction Methods 0.000 description 1
- 230000009471 action Effects 0.000 description 1
- 230000009118 appropriate response Effects 0.000 description 1
- 235000021028 berry Nutrition 0.000 description 1
- GINJFDRNADDBIN-FXQIFTODSA-N bilanafos Chemical compound OC(=O)[C@H](C)NC(=O)[C@H](C)NC(=O)[C@@H](N)CCP(C)(O)=O GINJFDRNADDBIN-FXQIFTODSA-N 0.000 description 1
- 238000010276 construction Methods 0.000 description 1
- 235000014510 cooky Nutrition 0.000 description 1
- 230000003247 decreasing effect Effects 0.000 description 1
- 230000007123 defense Effects 0.000 description 1
- 238000013461 design Methods 0.000 description 1
- 230000000694 effects Effects 0.000 description 1
- 210000000987 immune system Anatomy 0.000 description 1
- 230000036039 immunity Effects 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 238000005457 optimization Methods 0.000 description 1
- 230000008520 organization Effects 0.000 description 1
- 238000002360 preparation method Methods 0.000 description 1
- 238000012545 processing Methods 0.000 description 1
- 235000003499 redwood Nutrition 0.000 description 1
- 238000000926 separation method Methods 0.000 description 1
- 238000010561 standard procedure Methods 0.000 description 1
- 230000001960 triggered effect Effects 0.000 description 1
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L47/00—Traffic control in data switching networks
- H04L47/10—Flow control; Congestion control
- H04L47/24—Traffic characterised by specific attributes, e.g. priority or QoS
- H04L47/2441—Traffic characterised by specific attributes, e.g. priority or QoS relying on flow classification, e.g. using integrated services [IntServ]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/1458—Denial of Service
Definitions
- the present invention relates to packet communication networks and, in particular, to the use of packet parameters to characterize network traffic.
- Traffic characterization can be an important tool in intrusion detection, novelty and trend detection, providing appropriate quality of service and providing customized content.
- Intrusion detection relates to the discovery of network traffic that represents an attempt to try and break into computer systems attached to a particular subnet.
- an appropriately configured intrusion detection function of a traffic characterization system should be able to recognize the receipt of an abnormal packet and trigger an alarm or otherwise alert a human.
- Novelty and trend detection relates to detecting when incoming network traffic has never been seen before or when patterns of incoming network traffic are changing.
- an appropriately configured novelty and trend detection function of a traffic characterization system should be able to identify traffic representative of customers from previously unknown locations. It may be also useful to provide better resources to some network traffic and worse resources to others.
- an appropriately configured quality of service provision function of a traffic characterization system may provide good response times for customers who have made previous purchases, compared to first time visitors. Furthermore, it may be useful to deliver content based on some broad or precise prediction about the context in which the network traffic originates. For example, an appropriately configured customized content provision function of a traffic characterization system might allow for advertisements to be placed in served web pages, targeted to classes of users, or even individuals. For exemplary customized content provision consider the products of BroadVision Inc. of Redwood City, CA.
- responses to incoming traffic are made on tight deadlines. The faster each packet can be classified, the better, since an appropriate response can be made sooner. In particular, the amount of information required to classify each packet can impact performance of a traffic classification system.
- One existing technique for traffic characterization characterizes new traffic by comparing it to traffic with known characteristics. The closeness between known traffic and unknown traffic is compared. Computing closeness, even for a single pair of points, is computationally expensive in a high-dimensional space. Because the descriptions of known traffic are large, they cannot be practically stored in a simple data structure, but must be retrieved from a database. This can take a long time, and can only be carried out from within a user-level process.
- the techniques presented herein use geometric regions to characterize incoming traffic based on packet parameters, such as may be found in packet headers.
- the computation that determines a classification for each packet requires relatively simple operations on a small data set.
- the entire process can take place within the protocol layer (e.g., the Transport Control Protocol layer) rather than requiring an up-call to a full-fledged process.
- a novel process is provided that uses geometric regions in a low dimensional space to characterize network traffic. Classification can be carried out in a protocol layer. The approach can be applied to novelty detection and to automatic quality of service or content determination.
- a method to facilitate classification of packetized traffic includes considering at least a portion of a header of each of a training set of packets as an /n-dimensional vector and reversibly transforming each /w-dimensional vector to a r-dimensional vector, where r ⁇ m, and where an element of a given r-dimensional vector having a lower element number is more significant in differentiating the given r-dimensional vector from other r-dimensional vectors obtained from the training set than an element associated with a higher element number of the given r-dimensional vector such that the given r-dimensional vector is substantially defined with respect to the other r-dimensional vectors by its first k elements.
- a traffic classification system is provided for performing this method.
- a software medium that permits a general purpose computer to carry out this method.
- a method of classifying a received packet includes considering at least a portion of a header of the received packet as a received m-dimensional vector, reversibly transforming the received w-dimensional vector to a received r-dimensional vector, creating a received ⁇ -dimensional vector from the first k elements of each received r-dimensional vector and determining whether the received ⁇ -dimensional vector is within a first predefined k- dimensional region.
- a traffic classification system is provided for performing this method.
- a software medium that permits a general purpose computer to carry out this method.
- a method of classifying a received packet includes considering at least a portion of a header of the received packet as a received w-dimensional vector, transforming the received /n-dimensional vector to a received ⁇ -dimensional vector, determining whether the received ⁇ -dimensional vector is within an existing predefined ⁇ -dimensional region and, if the received ⁇ -dimensional vector is within a first predefined ⁇ -dimensional region, incrementing a first counter, the first counter associated with the first predefined k- dimensional region.
- a traffic classification system is provided for performing this method.
- a software medium that permits a general purpose computer to carry out this method.
- a traffic classification system includes a singular value decomposition calculator for transforming a matrix A of training data, which has been classified to result in training data classifications, into component matrices U, ⁇ and V.
- the traffic classification system also includes a boundary generator for, given the matrix U and the training data classifications, generating a boundary in a ⁇ -dimensional space, a geometric querier for, given the matrices ⁇ and V and received packet parameters, generating a point in the ⁇ -dimensional space and a detector for determining whether the point in the k- dimensional space is inside the boundary in the ⁇ -dimensional space and indicating a result of the determining.
- a software medium that provides computer-executable instructions to a traffic classification system.
- a device for facilitating classification of traffic includes a memory for storing a training set of packets and a processor, coupled to said memory, for considering at least a portion of a header of each of said training set of packets as an n-dimensional vector and reversibly transforming each said /n-dimensional vector to a r-dimensional vector, where r ⁇ m, and where an element of a given r-dimensional vector having a lower element number is more significant in differentiating said given r-dimensional vector from other r- dimensional vectors obtained from said training set than an element associated with a higher element number of said given r-dimensional vector such that said given r-dimensional vector is substantially defined with respect to said other r-dimensional vectors by its first k elements.
- FIG. 1 illustrates a typical network for use with an embodiment of the present invention
- FIG. 2 illustrates a representation of three dimensional rows of a matrix f/as points in three dimensional space
- FIG. 3 illustrates steps of a geometric region determining method according to an embodiment of the present invention
- FIG. 4 illustrates steps of a geometric region updating method according to an embodiment of the present invention
- FIG. 5 illustrates steps of a traffic classification method according to an embodiment of the present invention
- FIG. 6 illustrates steps of an alternative traffic classification method according to an embodiment of the present invention
- FIG. 7 illustrates a generic novelty detector according to an embodiment of the present invention.
- FIG. 8 illustrates steps of a staged traffic classification method according to an embodiment of the present invention.
- FIG. 1 illustrates a typical network 100 in which the present invention may find use.
- a local subnet 116 includes a local area network (LAN) 104 to which a number of local traffic sources and sinks 112A, 112B, 112C connect to communicate with each other.
- the local traffic sources and sinks 112A, 112B, 112C also communicate, via a gateway 108 and a wide area network such as the Internet 102, with remote traffic sources and sinks 106D, 106E, 106F.
- a traffic classification system 110 may be included in the gateway 108. Use of the traffic classification system 110 may help in minimizing the impact of an attack on the local subnet 116 based at an intruder computer 114.
- the traffic classification system 110 may include a processor 118 and a memory 120.
- the processor 118 may be loaded with traffic classification software for executing methods exemplary of this invention from a software medium 126, which may be a disk, a tape, a chip or a random access memory containing a file downloaded from a remote source.
- the traffic classification system 110 may be implemented in hardware, for instance, as a field programmable gate array. Furthermore, use of the traffic classification system 110 is not limited to the exemplary gateway 108. Subject to processing capabilities, the traffic classification system 110 may be included in a router, a network bridge or other network element.
- IP traffic is exchanged in packets of data, where a typical packet has a payload portion, containing the data, and a header portion providing information about the data. For instance, information about the data may include the source and destination of the data.
- LP Internet Protocol
- classification of traffic is facilitated by considering packet headers of a training set of packets as individual n-dimensional vectors.
- the /n-dimensional vectors are then reversibly transformed into r-dimensional vectors.
- the transformation results in r- dimensional vectors that are substantially defined, relative to each other, by their first k elements.
- This transformation can be said to be a mapping of the /n-dimensional vectors from w-space into ⁇ -space.
- geometric regions that are representative of each of the classes of traffic may be created in space.
- a given newly received packet may then be classified by transforming the header of the given newly received packet from /n-space into A:-space and predicting a class for the given newly received packet by proximity to, or enclosure within, a geometric region representative of a particular class. Predicting a class for a packet allows appropriate packet handling. For example, class prediction may allow the traffic classification system 110 to detect and eventually block traffic from the intruder computer 114.
- One embodiment of the present invention requires a training set of network packet headers whose classification is known.
- the training set may include a set of packet headers from normal traffic and a set of packet headers from traffic known to be related to intrusions.
- the training set might include a set of headers divided into those headers associated with traffic from big spending customers and those headers associated with traffic from ordinary customers.
- each packet header may be assigned a class label from a set of desired classifications.
- IP packet headers are 64 bits in size. Each bit is either a one or a zero and sets of these bits represent, among other things, source IP address, destination IP address, port number, protocol version number and a checksum. A subset of these bits may be discarded and other sets of these bits mapped to smaller sets to reduce the range of possible values incoming headers may take. Different bits may also be given different weights to reflect hypotheses about their individual contribution to discriminating among the classes.
- Each packet in the training set may then be represented by a vector of m ( ⁇ 64) elements and may be regarded as a point in a high-dimensional (/n-dimensional) space.
- each of these points is subsequently mapped to a point in a space of much lower dimension (say, two, three or four dimensions).
- This mapping may be performed using Singular Value Decomposition (SVD).
- SVD Singular Value Decomposition
- SVD has been used extensively in information retrieval applications and for choosing objects in object-oriented program code. It is known that SVD can capture the relationships between objects and then effectively represent the relationships as distances between points in a low- dimensional space.
- the input data for an SVD operation can be regarded as an n-by-m matrix, A.
- Each row in A can be regarded as representing one packet and each column in A can be regarded as representing a bit position in the packet headers.
- different bits may also be given different weights. These weights may be reflected in the bit positions. Additionally, if necessary, the values in each column o ⁇ A may be normalized.
- the singular value decomposition of a matrix A allows the matrix A to be expressed as a product of three matrices, U(n-by-r), ⁇ (r-by-r), and V(r-by-m) where r is the rank of the matrix A.
- the matrix ⁇ is a diagonal matrix whose diagonal entries (the so-called singular values) are ordered in order of descending magnitude (so that the largest valued element is ⁇ i and the smallest valued element is ⁇ r ).
- Matrices Uand are orthonormal. A set of vectors is said to be an orthonormal set if every pair of vectors is orthogonal and every vector is a unit vector. The decomposition is shown below.
- Each of the rows of the matrix formed from the first k columns of U can be regarded as points in a ⁇ -dimensional space.
- k is chosen to be fairly small.
- the magnitude of the singular values, i.e., the ⁇ , values in the matrix ⁇ represent the amount of variation in the original data (matrix ) captured by each column (and hence each dimension) of the matrix U.
- the singular values are monotonically decreasing, i.e., ⁇ ⁇ 2 > ... > ⁇ r > 0.
- the first eight rows of A represent one class of traffic (perhaps normal traffic) and the remaining three rows of A represent another class of traffic (perhaps intrusions).
- the values in each column could be normalized but, in this case, each header has the same number of 0 and 1 bits and the column sums are approximately equal. We may therefore use this data directly.
- FIG.2 A representation of the three dimensional rows of U as points in three dimensional space is shown in FIG.2.
- the points are shown by "+" symbols associated with a number indicative of the row in matrix £/(and correspondingly, matrix ) that the point represents. Note that there is a clear separation between points from the two classes of traffic. Note also that the first class separates into two subclasses - in this case based on whether or not bit number 3 is a 1 - and that this could be the basis for further classification.
- Points from the same class may now be captured geometrically. This can be done by constructing a geometric region that encloses the points of each class, or by constructing linear or non-linear separators between the classes. Exemplary geometric regions include a convex hull, which provides a tight enclosure for a set of points in the same class, and a bounding box, which provides a less rigorous enclosure, but may still cleanly separate the classes.
- a bounding box for a particular class of points may be defined as the smallest box that may be determined that encloses all points in the class. In three dimensions, a bounding box may be defined by six extreme coordinates defining three ranges (x 1 ⁇ X2,y ⁇ ,y2, zi)-
- FIG. 3 illustrates an algorithm whose result is a set of geometric regions for characterizing the classes of incoming packet headers.
- Vectors comprised of rows of U that include only the first k columns
- a geometric algorithm convex hull, bounding box, linear separator, nonlinear separator
- the global properties of the network traffic at a particular site or subnet change over time.
- the classification of traffic of a particular kind may change as a result of further analysis of its contents, actions taken during the session of which it is a part, or changes in the configuration or properties of the site or subnet. In some applications this results in a need to update the geometric regions over time.
- the entire SVD can be recomputed using the original data and the new data from transactions, now labeled with a known class, after their interaction with the traffic classification system 110 (FIG. 1).
- the method may be repeated with a set of n + n ' points in order to recalibrate the regions (where the n points are the original points and the n ' points are the recently classified points). This gives a complete re-mapping of the spatial locations of the data, but is also expensive to compute (O( « 3 ) in this setting).
- Another way to compute an incremental SVD involves adding the n ' recently classified points to A, thereby yielding a new matrix A '. From new matrix A ' and previously determined matrices ⁇ and V, a new matrix U' may be determined by solving for n' new rows to add to U. [0043] Depending on the choice of technique, the result is a new set of labeled points in a low-dimensional space. The computation of geometric regions must now be repeated for those new points.
- Steps of a method for updating geometric regions with an incremental SVD are presented in FIG. 4.
- an incremental SVD may be computed (step 402) to yield a new matrix U'.
- the first k columns of the new matrix U' are regarded as points in ⁇ space (step 404).
- the geometric algorithm (convex hull, bounding box, linear separator, nonlinear separator) of step 306 above is repeated to divide ⁇ -space into geometric regions, where each geometric region encloses points in a single class (step 406).
- determining a predicted class for a packet header requires mapping the packet header into the low-dimensional space representing the known data and then determining into which region the low-dimensional point representative of the packet header falls.
- the first step is to extract and weight the header bits of the new packet in exactly the same way as was done for the geometric region creation process.
- the extracted and weighted bits are then mapped into a point in the low-dimensional space using a querying technique based on SVD.
- a querying technique based on SVD.
- the position of the low-dimensional point in relation to the geometric regions can be determined. In the case of regions enclosing regions, this means determining whether the point falls inside or outside each region. Standard algorithms for containment in a convex hull can be used; these do not require significant computation. For the case of separators, it means determining on which side of each separator the point lies. Again, standard techniques can be used.
- the method whose steps are illustrated in FIG. 5 takes U, ⁇ and V matrices from an SVD, a set of geometric regions R, and class labels associated with each region R, as input.
- a new packet is received (step 502).
- the header of the new packet is mapped to a k- dimensional point in £-space using an appropriate technique (step 504) such as discussed above.
- the class label associated with the class represented by the region R, into which the point falls is then supplied as output of the method (step 508). If the entire space is not described by the regions R, and the ⁇ -dimensional point falls outside of all regions, then this condition may be indicated (step 510).
- a denial of service (DoS) attack is an incident in which a user or organization is deprived of the services of a resource they would normally expect to have.
- DoS denial of service
- One of the most dangerous forms of Denial of Service attacks is a SYN Attack.
- a computer that initiates a communication session (an initiator) sends a TCP SYN synchronization packet to a receiving server.
- the receiving server sends back a TCP SYN- ACK packet and then the initiator responds with an ACK acknowledgment. After this handshake, both parties are set to send and receive data.
- Each TCP SYN packet causes the targeted system to issue a SYN-ACK response. While the targeted system waits for the ACK that should follow the SYN-ACK, the targeted system queues up all outstanding SYN-ACK responses on what is known as a backlog queue. This backlog queue has a finite length that is usually quite small. Once the backlog queue is full, the targeted system will ignore all incoming TCP SYN packets.
- SYN-ACKs are moved off the queue only when an ACK comes back or when an internal timer (which is set to a relatively long interval) terminates the three-part handshake.
- a SYN Attack creates each SYN packet in the flood with a "bad" source IP address, which identifies the original packet.
- a source IP address is "bad” if it either does not actually exist or is down. All SYN-ACK responses are sent to the source IP address.
- a DoS attack can be characterized by the appearance of similar packets within a time-frame that is too short for them to have been generated by normal activity.
- a threshold value may be established for each newly detected intrusion in the DoS detector for the purpose of detecting DoS attacks before the attacks disable the systems of the local subnet 116 (FIG. 1)
- the geometric regions are determined by ongoing packet arrivals, rather than from the ⁇ -dimensional points extracted from the matrix Um ' the initial SVD.
- Each packet may be considered as creating a sphere of given diameter around its low-dimensional position. Newer points may be tested to see if they fall into any existing sphere. If more than a given number of points are found in the same sphere, the system may be undergoing a DoS attack. The spheres themselves may be allowed to disappear after a given period of time. This can only be achieved due to the fast detection we enjoy using the SVD detection model.
- a new packet is received (step 602).
- the new packet header may then be mapped to a point in ⁇ r-space (step 604) using methods described hereinbefore. It is then determined whether the newly mapped point falls into an existing geometric region (step 606). If the newly mapped point does fall into an existing geometric region, a count for that geometric region is incremented (step 608). If it is determined that the count exceeds a given threshold (step 610), an alarm may be triggered (step 612).
- a new geometric region is created (step 614) and a count associated with the new geometric region is initialized to one (step 616). Additionally, a count down timer for each region is initialized when the region is created. Whenever a newly mapped point falls into a given region, the count down timer for the given region is re-initialized. If a count down timer for a region times out, the region is deleted.
- FIG. 7 Architecture for a generic SVD detector 700 is illustrated in FIG. 7.
- the detector 700 includes an SVD calculator 702, a boundary generator 706, a geometric querier 704 and a novelty detector 708.
- the SVD calculator 702 in C and employed a common singular value decomposition process (a macro program for computing SVDs is also available in MATLABTM software packages). As shown, the input to the SVD calculator 702 is a set of normal packets and a set of known abnormal packets. The output of the SVD calculator 702 is the matrices U, ⁇ and V. These matrices are provided to the boundary generator 706 and the geometric querier 704.
- the boundary generator 706 was written in C as well and generated a loose, less rigorous, but cheaper bounding box as an outer boundary and a tighter, more accurate, but more computationally expensive convex hull as an inner boundary, to enclose a set of points that belong to the same class in a three dimensional space.
- the bounding box was constructed using the extreme coordinates in six directions (i.e., two along the x-axis, two along the y- axis and two along the z-axis) of its input data set.
- the convex hull was constructed using a software package named Qhull, which implements a high-quality, robust, and user-friendly process for computing a convex hull in any dimension.
- Qhull is available at http://www.geom.umn.edu/software/qhull.
- the process used in Qhull originates from the Quickhull process that may be found in J. O'Rourke, Computational Geometry in C, Cambridge University Press, 2nd Edition, 1998, herby incorporated herein by reference.
- the geometric querier 704 exploited the SVD query process and was also coded in C.
- the geometric querier 704 takes as input a new compressed header and a set of V and ⁇ matrices from the SVD calculator 702.
- the novelty detector 708 uses the bounding box and the convex hull that were constructed earlier and supplied to the novelty detector 708 by the boundary generator 706. The language used to implement the novelty detector 708 was also C.
- the SVD calculator 702 queries the memory 120 (FIG. 1) and receives a set of training data. The SVD calculator 702 then decomposed the set of training data and the matrices resulting from the decomposition were used by the boundary generator 706 to generate a bounding box and a convex hull. A new packet was received at the geometric querier 704 and the header of that packet was mapped to a new traffic point in ⁇ -space. It was then determined whether the new traffic point fell outside the bounding box (step 802).
- a flag was returned (step 804) indicating that the new traffic point fell outside the bounding box, and thus the packet was "abnormal". If the new traffic point fell inside the bounding box, the new traffic point was checked again (step 806) to determine if the new traffic point fell within the convex hull. If the new traffic point did not fall within the convex hull, a flag was returned (step 808) indicating that the new traffic point fell outside the convex hull, and thus the packet was "abnormal”. If the new traffic point fell within the convex hull, a flag was returned (step 810) indicating that the new traffic point fell inside the convex hull, and thus the packet was "normal".
- a further stage may be added to the staged approach of FIG. 8.
- the boundary generator 706 may also supply an inner bounding box that does not bound the training points, but can be placed entirely within the convex hull. This is in contrast to the original (outer) bounding box, which entirely encloses the convex hull. Points representative of intrusions are likely to fall outside the outer bounding box and points representative of normal traffic are likely to fall inside the inner bounding box. When a given point falls either outside the outer bounding box or inside the inner bounding box, the more expensive check against the convex hull is not necessary. This approach provides significant performance optimizations, since the great majority of new traffic points fall inside the inner bounding box.
- Detection rates are greatly improved if the low-dimensional space is constructed using normal traffic and a sample of abnormal traffic. Choosing different abnormal traffic for the sample results in different low-dimensional spaces.
- normal traffic always maps into (or very close to) the normal region, while abnormal traffic may, on occasion, also map into the normal region for some low-dimensional spaces, abnormal traffic tends to fall further and further from the normal region the more it resembles known abnormal traffic.
- a set of low-dimensional spaces and normal traffic regions are constructed, each one using the same normal traffic and a different set of abnormal traffic.
- a new packet header is mapped into each low-dimensional space separately. The new packet is classified as normal only if it falls into the normal region in all of the low-dimensional spaces. Thus, a point that falls outside the normal region in any of the low-dimensional spaces is classified as an intrusion.
- the sets of abnormal traffic can be generated from an initial, known intrusion by manipulating the bits of the external addresses to make them as different as possible. For example, these address bits can be complemented to create an artificial intrusion that is from the "opposite direction" to the initial intrusion.
- an interaction or communication session involves many packets.
- the present invention may be adapted to use some or all of this parametric information, and is not necessarily limited to packet headers.
- SVD may not be the only method for transforming points in a high dimensional space into a much lower dimensional space.
- PC A Principle Component Analysis
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
Abstract
Description
Claims
Priority Applications (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
EP01929138A EP1279268A2 (en) | 2000-05-03 | 2001-05-03 | Characterizing network traffic from packet parameters |
AU2001256022A AU2001256022A1 (en) | 2000-05-03 | 2001-05-03 | Characterizing network traffic from packet parameters |
Applications Claiming Priority (4)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US20166300P | 2000-05-03 | 2000-05-03 | |
US60/201,663 | 2000-05-03 | ||
CA2,313,908 | 2000-07-14 | ||
CA002313908A CA2313908A1 (en) | 2000-07-14 | 2000-07-14 | Intrusion detection in networks using singular value decomposition |
Publications (2)
Publication Number | Publication Date |
---|---|
WO2001084774A2 true WO2001084774A2 (en) | 2001-11-08 |
WO2001084774A3 WO2001084774A3 (en) | 2002-09-06 |
Family
ID=25681951
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/CA2001/000596 WO2001084774A2 (en) | 2000-05-03 | 2001-05-03 | Characterizing network traffic from packet parameters |
Country Status (3)
Country | Link |
---|---|
EP (1) | EP1279268A2 (en) |
AU (1) | AU2001256022A1 (en) |
WO (1) | WO2001084774A2 (en) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2003103239A1 (en) * | 2002-05-31 | 2003-12-11 | Cisco Technology, Inc. | Processing packets based on context indications |
US11586971B2 (en) | 2018-07-19 | 2023-02-21 | Hewlett Packard Enterprise Development Lp | Device identifier classification |
Family Cites Families (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5951651A (en) * | 1997-07-23 | 1999-09-14 | Lucent Technologies Inc. | Packet filter system using BITMAP vector of filter rules for routing packet through network |
US7133400B1 (en) * | 1998-08-07 | 2006-11-07 | Intel Corporation | System and method for filtering data |
-
2001
- 2001-05-03 AU AU2001256022A patent/AU2001256022A1/en not_active Abandoned
- 2001-05-03 EP EP01929138A patent/EP1279268A2/en not_active Withdrawn
- 2001-05-03 WO PCT/CA2001/000596 patent/WO2001084774A2/en not_active Application Discontinuation
Cited By (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2003103239A1 (en) * | 2002-05-31 | 2003-12-11 | Cisco Technology, Inc. | Processing packets based on context indications |
CN1305274C (en) * | 2002-05-31 | 2007-03-14 | 思科技术公司 | Method and device for processing packet |
US7336660B2 (en) | 2002-05-31 | 2008-02-26 | Cisco Technology, Inc. | Method and apparatus for processing packets based on information extracted from the packets and context indications such as but not limited to input interface characteristics |
US11586971B2 (en) | 2018-07-19 | 2023-02-21 | Hewlett Packard Enterprise Development Lp | Device identifier classification |
US12026597B2 (en) | 2018-07-19 | 2024-07-02 | Hewlett Packard Enterprise Development Lp | Device identifier classification |
Also Published As
Publication number | Publication date |
---|---|
AU2001256022A1 (en) | 2001-11-12 |
WO2001084774A3 (en) | 2002-09-06 |
EP1279268A2 (en) | 2003-01-29 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US20030108042A1 (en) | Characterizing network traffic from packet parameters | |
Choudhary et al. | Analysis of KDD-Cup’99, NSL-KDD and UNSW-NB15 datasets using deep learning in IoT | |
Diro et al. | Leveraging LSTM networks for attack detection in fog-to-things communications | |
Paliwal et al. | Denial-of-service, probing & remote to user (R2L) attack detection using genetic algorithm | |
Kim et al. | Network-based intrusion detection with support vector machines | |
Aborujilah et al. | Cloud‐Based DDoS HTTP Attack Detection Using Covariance Matrix Approach | |
Kachavimath et al. | A deep learning-based framework for distributed denial-of-service attacks detection in cloud environment | |
Cvitić et al. | An overview of distributed denial of service traffic detection approaches | |
Khan et al. | Network intrusion detection using stack-ensemble ANN | |
Thereza et al. | Development of intrusion detection models for iot networks utilizing ciciot2023 dataset | |
Stiawan et al. | IoT botnet attack detection using deep autoencoder and artificial neural networks. | |
Mateus et al. | Federated learning-based solution for DDoS detection in SDN | |
Kumar et al. | Intrusion detection for the Internet of Things | |
Althobaiti et al. | Securing Cloud Computing from Flash Crowd Attack Using Ensemble Intrusion Detection System. | |
US10911465B1 (en) | Multi-stage intrusion detection system alarm ranking system | |
Tanveer et al. | Ensemble-Guard IoT: A Lightweight Ensemble Model for Real-Time Attack Detection on Imbalanced Dataset | |
Madwanna et al. | YARS-IDS: a novel ids for multi-class classification | |
EP1279268A2 (en) | Characterizing network traffic from packet parameters | |
Shao et al. | A fuzzy detection approach toward different speed port scan attacks based on Dempster–Shafer evidence theory | |
EP3542509B1 (en) | Velocity event evaluation system | |
Ahmad et al. | Low-latency intrusion detection using a deep neural network | |
CN112242973A (en) | DDoS attack detection method, device, computing device and computer storage medium | |
Sokolov et al. | Analytical Modeling of Computer Attacks on Intelligent Transport Systems Based on the Transformation of Stochastic Networks | |
Umamaheswari et al. | A subset feature selection based DDoS detection using cascade correlation optimal neural network for improving network resources in virtualized cloud environment | |
Haq et al. | Optimizing Distributed Denial of Service (DDoS) Attack Detection Techniques on Software Defined Network (SDN) Using Feature Selection |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AK | Designated states |
Kind code of ref document: A2 Designated state(s): AE AG AL AM AT AU AZ BA BB BG BR BY BZ CA CH CN CR CU CZ DE DK DM DZ EE ES FI GB GD GE GH GM HR HU ID IL IN IS JP KE KG KP KR KZ LC LK LR LS LT LU LV MA MD MG MK MN MW MX MZ NO NZ PL PT RO RU SD SE SG SI SK SL TJ TM TR TT TZ UA UG US UZ VN YU ZA ZW |
|
AL | Designated countries for regional patents |
Kind code of ref document: A2 Designated state(s): GH GM KE LS MW MZ SD SL SZ TZ UG ZW AM AZ BY KG KZ MD RU TJ TM AT BE CH CY DE DK ES FI FR GB GR IE IT LU MC NL PT SE TR BF BJ CF CG CI CM GA GN GW ML MR NE SN TD TG |
|
121 | Ep: the epo has been informed by wipo that ep was designated in this application | ||
DFPE | Request for preliminary examination filed prior to expiration of 19th month from priority date (pct application filed before 20040101) | ||
WWE | Wipo information: entry into national phase |
Ref document number: 10275214 Country of ref document: US |
|
WWE | Wipo information: entry into national phase |
Ref document number: 2001929138 Country of ref document: EP |
|
WWP | Wipo information: published in national office |
Ref document number: 2001929138 Country of ref document: EP |
|
NENP | Non-entry into the national phase |
Ref country code: JP |
|
WWW | Wipo information: withdrawn in national office |
Ref document number: 2001929138 Country of ref document: EP |