A Study of Collaborative Discovering of Suspicious Network Behaviors

碩士 === 國立交通大學 === 資訊科學與工程研究所 === 94 === As the rapid growth of network attacking tools, patterns of network intrusion events change gradually. Referring to the newest Symantec Internet Security Threat Report, we found that network intrusion behaviors evolve into more hidden and target-specific behav...

Full description

Bibliographic Details
Main Authors: Yung-Yu Lin, 林永彧
Other Authors: Shian-Shyong Tseng
Format: Others
Language:en_US
Published: 2006
Online Access:http://ndltd.ncl.edu.tw/handle/82199720080097230068
id ndltd-TW-094NCTU5394042
record_format oai_dc
spelling ndltd-TW-094NCTU53940422016-05-27T04:18:34Z http://ndltd.ncl.edu.tw/handle/82199720080097230068 A Study of Collaborative Discovering of Suspicious Network Behaviors 發掘可疑網路行為的聯合防禦分析方法 Yung-Yu Lin 林永彧 碩士 國立交通大學 資訊科學與工程研究所 94 As the rapid growth of network attacking tools, patterns of network intrusion events change gradually. Referring to the newest Symantec Internet Security Threat Report, we found that network intrusion behaviors evolve into more hidden and target-specific behaviors. There are many researches had been proposed to analyze network intrusion behaviors in accordance with low-level network data. However, since these researches might suffer a large mount of false alerts, it is very difficult for network administrators to discover useful information from these alerts. To reduce the load of administrators, by collecting and analyzing unknown attack sequences systematically, administrators can do the duty of fixing the root causes and researching attack events. However, due to the different characteristics for each intrusion, there is no single analysis method which can correlate IDS alerts perfectly and discover all kinds of real intrusion patterns up to the present. Therefore, a knowledge-based framework for Collaborative Discovering Suspicious Network Behaviors (CDSNB) is proposed in this thesis. The framework of CDSNB consists of three phases: Data Preprocessing Phase, Alert Filtering Phase and Collaborative Analysis Phase. The Data Processing Phase is used to divide sensors into groups with specific system and network profiles, and IDS alerts of these groups are transformed into alert transactions with specific data formats according to requirements in the Collaborative Analysis Phase. Because of numerous of false alerts, the Alert Filtering Phase is used to construct Filter Model (FM) of sensors in specific group to filter most false alerts. The Collaborative Analysis Phase is used to analyze each alert pattern and classify the results into aggregated information for administrators as references of intrusion defense in the viewpoint of specific sensor groups with similar backgrounds and behaviors. In this knowledge-based analysis framework, the system interacts with administrators to assist them making appropriate decisions in each phase. According to the urgent situations of different levels, Network administrators can do event protecting or vulnerability repairing, even or cause tracing of attacks. Therefore, the knowledge-based framework of CDSNB can prevent attacks effectively, find novel attack patterns exactly and reduce the load of administrators efficiently. Shian-Shyong Tseng 曾憲雄 2006 學位論文 ; thesis 68 en_US
collection NDLTD
language en_US
format Others
sources NDLTD
description 碩士 === 國立交通大學 === 資訊科學與工程研究所 === 94 === As the rapid growth of network attacking tools, patterns of network intrusion events change gradually. Referring to the newest Symantec Internet Security Threat Report, we found that network intrusion behaviors evolve into more hidden and target-specific behaviors. There are many researches had been proposed to analyze network intrusion behaviors in accordance with low-level network data. However, since these researches might suffer a large mount of false alerts, it is very difficult for network administrators to discover useful information from these alerts. To reduce the load of administrators, by collecting and analyzing unknown attack sequences systematically, administrators can do the duty of fixing the root causes and researching attack events. However, due to the different characteristics for each intrusion, there is no single analysis method which can correlate IDS alerts perfectly and discover all kinds of real intrusion patterns up to the present. Therefore, a knowledge-based framework for Collaborative Discovering Suspicious Network Behaviors (CDSNB) is proposed in this thesis. The framework of CDSNB consists of three phases: Data Preprocessing Phase, Alert Filtering Phase and Collaborative Analysis Phase. The Data Processing Phase is used to divide sensors into groups with specific system and network profiles, and IDS alerts of these groups are transformed into alert transactions with specific data formats according to requirements in the Collaborative Analysis Phase. Because of numerous of false alerts, the Alert Filtering Phase is used to construct Filter Model (FM) of sensors in specific group to filter most false alerts. The Collaborative Analysis Phase is used to analyze each alert pattern and classify the results into aggregated information for administrators as references of intrusion defense in the viewpoint of specific sensor groups with similar backgrounds and behaviors. In this knowledge-based analysis framework, the system interacts with administrators to assist them making appropriate decisions in each phase. According to the urgent situations of different levels, Network administrators can do event protecting or vulnerability repairing, even or cause tracing of attacks. Therefore, the knowledge-based framework of CDSNB can prevent attacks effectively, find novel attack patterns exactly and reduce the load of administrators efficiently.
author2 Shian-Shyong Tseng
author_facet Shian-Shyong Tseng
Yung-Yu Lin
林永彧
author Yung-Yu Lin
林永彧
spellingShingle Yung-Yu Lin
林永彧
A Study of Collaborative Discovering of Suspicious Network Behaviors
author_sort Yung-Yu Lin
title A Study of Collaborative Discovering of Suspicious Network Behaviors
title_short A Study of Collaborative Discovering of Suspicious Network Behaviors
title_full A Study of Collaborative Discovering of Suspicious Network Behaviors
title_fullStr A Study of Collaborative Discovering of Suspicious Network Behaviors
title_full_unstemmed A Study of Collaborative Discovering of Suspicious Network Behaviors
title_sort study of collaborative discovering of suspicious network behaviors
publishDate 2006
url http://ndltd.ncl.edu.tw/handle/82199720080097230068
work_keys_str_mv AT yungyulin astudyofcollaborativediscoveringofsuspiciousnetworkbehaviors
AT línyǒngyù astudyofcollaborativediscoveringofsuspiciousnetworkbehaviors
AT yungyulin fājuékěyíwǎnglùxíngwèideliánhéfángyùfēnxīfāngfǎ
AT línyǒngyù fājuékěyíwǎnglùxíngwèideliánhéfángyùfēnxīfāngfǎ
AT yungyulin studyofcollaborativediscoveringofsuspiciousnetworkbehaviors
AT línyǒngyù studyofcollaborativediscoveringofsuspiciousnetworkbehaviors
_version_ 1718282631225802752