Cargando…
Applying MMD Data Mining to Match Network Traffic for Stepping-Stone Intrusion Detection
A long interactive TCP connection chain has been widely used by attackers to launch their attacks and thus avoid detection. The longer a connection chain, the higher the probability the chain is exploited by attackers. Round-trip Time (RTT) can represent the length of a connection chain. In order to...
Autores principales: | , |
---|---|
Formato: | Online Artículo Texto |
Lenguaje: | English |
Publicado: |
MDPI
2021
|
Materias: | |
Acceso en línea: | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC8618504/ https://www.ncbi.nlm.nih.gov/pubmed/34833539 http://dx.doi.org/10.3390/s21227464 |
_version_ | 1784604763615133696 |
---|---|
author | Yang, Jianhua Wang, Lixin |
author_facet | Yang, Jianhua Wang, Lixin |
author_sort | Yang, Jianhua |
collection | PubMed |
description | A long interactive TCP connection chain has been widely used by attackers to launch their attacks and thus avoid detection. The longer a connection chain, the higher the probability the chain is exploited by attackers. Round-trip Time (RTT) can represent the length of a connection chain. In order to obtain the RTTs from the sniffed Send and Echo packets in a connection chain, matching the Sends and Echoes is required. In this paper, we first model a network traffic as the collection of RTTs and present the rationale of using the RTTs of a connection chain to represent the length of the chain. Second, we propose applying MMD data mining algorithm to match TCP Send and Echo packets collected from a connection. We found that the MMD data mining packet-matching algorithm outperforms all the existing packet-matching algorithms in terms of packet-matching rate including sequence number-based algorithm, Yang’s approach, Step-function, Packet-matching conservative algorithm and packet-matching greedy algorithm. The experimental results from our local area networks showed that the packet-matching accuracy of the MMD algorithm is 100%. The average packet-matching rate of the MMD algorithm obtained from the experiments conducted under the Internet context can reach around 94%. The MMD data mining packet-matching algorithm can fix the issue of low packet-matching rate faced by all the existing packet-matching algorithms including the state-of-the-art algorithm. It is applicable to network-based stepping-stone intrusion detection. |
format | Online Article Text |
id | pubmed-8618504 |
institution | National Center for Biotechnology Information |
language | English |
publishDate | 2021 |
publisher | MDPI |
record_format | MEDLINE/PubMed |
spelling | pubmed-86185042021-11-27 Applying MMD Data Mining to Match Network Traffic for Stepping-Stone Intrusion Detection Yang, Jianhua Wang, Lixin Sensors (Basel) Article A long interactive TCP connection chain has been widely used by attackers to launch their attacks and thus avoid detection. The longer a connection chain, the higher the probability the chain is exploited by attackers. Round-trip Time (RTT) can represent the length of a connection chain. In order to obtain the RTTs from the sniffed Send and Echo packets in a connection chain, matching the Sends and Echoes is required. In this paper, we first model a network traffic as the collection of RTTs and present the rationale of using the RTTs of a connection chain to represent the length of the chain. Second, we propose applying MMD data mining algorithm to match TCP Send and Echo packets collected from a connection. We found that the MMD data mining packet-matching algorithm outperforms all the existing packet-matching algorithms in terms of packet-matching rate including sequence number-based algorithm, Yang’s approach, Step-function, Packet-matching conservative algorithm and packet-matching greedy algorithm. The experimental results from our local area networks showed that the packet-matching accuracy of the MMD algorithm is 100%. The average packet-matching rate of the MMD algorithm obtained from the experiments conducted under the Internet context can reach around 94%. The MMD data mining packet-matching algorithm can fix the issue of low packet-matching rate faced by all the existing packet-matching algorithms including the state-of-the-art algorithm. It is applicable to network-based stepping-stone intrusion detection. MDPI 2021-11-10 /pmc/articles/PMC8618504/ /pubmed/34833539 http://dx.doi.org/10.3390/s21227464 Text en © 2021 by the authors. https://creativecommons.org/licenses/by/4.0/Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/). |
spellingShingle | Article Yang, Jianhua Wang, Lixin Applying MMD Data Mining to Match Network Traffic for Stepping-Stone Intrusion Detection |
title | Applying MMD Data Mining to Match Network Traffic for Stepping-Stone Intrusion Detection |
title_full | Applying MMD Data Mining to Match Network Traffic for Stepping-Stone Intrusion Detection |
title_fullStr | Applying MMD Data Mining to Match Network Traffic for Stepping-Stone Intrusion Detection |
title_full_unstemmed | Applying MMD Data Mining to Match Network Traffic for Stepping-Stone Intrusion Detection |
title_short | Applying MMD Data Mining to Match Network Traffic for Stepping-Stone Intrusion Detection |
title_sort | applying mmd data mining to match network traffic for stepping-stone intrusion detection |
topic | Article |
url | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC8618504/ https://www.ncbi.nlm.nih.gov/pubmed/34833539 http://dx.doi.org/10.3390/s21227464 |
work_keys_str_mv | AT yangjianhua applyingmmddataminingtomatchnetworktrafficforsteppingstoneintrusiondetection AT wanglixin applyingmmddataminingtomatchnetworktrafficforsteppingstoneintrusiondetection |