Cargando…

Applying MMD Data Mining to Match Network Traffic for Stepping-Stone Intrusion Detection

A long interactive TCP connection chain has been widely used by attackers to launch their attacks and thus avoid detection. The longer a connection chain, the higher the probability the chain is exploited by attackers. Round-trip Time (RTT) can represent the length of a connection chain. In order to...

Descripción completa

Detalles Bibliográficos
Autores principales: Yang, Jianhua, Wang, Lixin
Formato: Online Artículo Texto
Lenguaje:English
Publicado: MDPI 2021
Materias:
Acceso en línea:https://www.ncbi.nlm.nih.gov/pmc/articles/PMC8618504/
https://www.ncbi.nlm.nih.gov/pubmed/34833539
http://dx.doi.org/10.3390/s21227464
_version_ 1784604763615133696
author Yang, Jianhua
Wang, Lixin
author_facet Yang, Jianhua
Wang, Lixin
author_sort Yang, Jianhua
collection PubMed
description A long interactive TCP connection chain has been widely used by attackers to launch their attacks and thus avoid detection. The longer a connection chain, the higher the probability the chain is exploited by attackers. Round-trip Time (RTT) can represent the length of a connection chain. In order to obtain the RTTs from the sniffed Send and Echo packets in a connection chain, matching the Sends and Echoes is required. In this paper, we first model a network traffic as the collection of RTTs and present the rationale of using the RTTs of a connection chain to represent the length of the chain. Second, we propose applying MMD data mining algorithm to match TCP Send and Echo packets collected from a connection. We found that the MMD data mining packet-matching algorithm outperforms all the existing packet-matching algorithms in terms of packet-matching rate including sequence number-based algorithm, Yang’s approach, Step-function, Packet-matching conservative algorithm and packet-matching greedy algorithm. The experimental results from our local area networks showed that the packet-matching accuracy of the MMD algorithm is 100%. The average packet-matching rate of the MMD algorithm obtained from the experiments conducted under the Internet context can reach around 94%. The MMD data mining packet-matching algorithm can fix the issue of low packet-matching rate faced by all the existing packet-matching algorithms including the state-of-the-art algorithm. It is applicable to network-based stepping-stone intrusion detection.
format Online
Article
Text
id pubmed-8618504
institution National Center for Biotechnology Information
language English
publishDate 2021
publisher MDPI
record_format MEDLINE/PubMed
spelling pubmed-86185042021-11-27 Applying MMD Data Mining to Match Network Traffic for Stepping-Stone Intrusion Detection Yang, Jianhua Wang, Lixin Sensors (Basel) Article A long interactive TCP connection chain has been widely used by attackers to launch their attacks and thus avoid detection. The longer a connection chain, the higher the probability the chain is exploited by attackers. Round-trip Time (RTT) can represent the length of a connection chain. In order to obtain the RTTs from the sniffed Send and Echo packets in a connection chain, matching the Sends and Echoes is required. In this paper, we first model a network traffic as the collection of RTTs and present the rationale of using the RTTs of a connection chain to represent the length of the chain. Second, we propose applying MMD data mining algorithm to match TCP Send and Echo packets collected from a connection. We found that the MMD data mining packet-matching algorithm outperforms all the existing packet-matching algorithms in terms of packet-matching rate including sequence number-based algorithm, Yang’s approach, Step-function, Packet-matching conservative algorithm and packet-matching greedy algorithm. The experimental results from our local area networks showed that the packet-matching accuracy of the MMD algorithm is 100%. The average packet-matching rate of the MMD algorithm obtained from the experiments conducted under the Internet context can reach around 94%. The MMD data mining packet-matching algorithm can fix the issue of low packet-matching rate faced by all the existing packet-matching algorithms including the state-of-the-art algorithm. It is applicable to network-based stepping-stone intrusion detection. MDPI 2021-11-10 /pmc/articles/PMC8618504/ /pubmed/34833539 http://dx.doi.org/10.3390/s21227464 Text en © 2021 by the authors. https://creativecommons.org/licenses/by/4.0/Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
spellingShingle Article
Yang, Jianhua
Wang, Lixin
Applying MMD Data Mining to Match Network Traffic for Stepping-Stone Intrusion Detection
title Applying MMD Data Mining to Match Network Traffic for Stepping-Stone Intrusion Detection
title_full Applying MMD Data Mining to Match Network Traffic for Stepping-Stone Intrusion Detection
title_fullStr Applying MMD Data Mining to Match Network Traffic for Stepping-Stone Intrusion Detection
title_full_unstemmed Applying MMD Data Mining to Match Network Traffic for Stepping-Stone Intrusion Detection
title_short Applying MMD Data Mining to Match Network Traffic for Stepping-Stone Intrusion Detection
title_sort applying mmd data mining to match network traffic for stepping-stone intrusion detection
topic Article
url https://www.ncbi.nlm.nih.gov/pmc/articles/PMC8618504/
https://www.ncbi.nlm.nih.gov/pubmed/34833539
http://dx.doi.org/10.3390/s21227464
work_keys_str_mv AT yangjianhua applyingmmddataminingtomatchnetworktrafficforsteppingstoneintrusiondetection
AT wanglixin applyingmmddataminingtomatchnetworktrafficforsteppingstoneintrusiondetection