Carnegie Mellon University
Browse

Detecting Scans at the ISP Level

Download (652.66 kB)
journal contribution
posted on 1998-01-01, 00:00 authored by Carrie Gates, Josh McNutt, Joseph B. Kadane, Marc Kellner
Scans are often used by adversaries to determine the potential weaknesses in a target network or system prior to an intrusion attempt. In other cases, exploits are packaged with the scans themselves. This report presents a novel approach to detecting scans (including very stealthy scans) against, or passing through, very large networks. It meets operational requirements that are particular to detecting scans in ISP level networks. This scan-detection approach performs an ongoing, incremental analysis of flow-level data regarding traffic inbound to a network. It is multi-dimensional and flexible, based on up to 21 characteristics describing traffic collected from any single source. The report describes in detail a method developed to provide a probability that a particular traffic sample contains a scan. In validation testing using a manual analysis of traffic collected from a high-volume network, this method correctly classified 99.3% of TCP traffic samples. This report also compares this new approach to other scan approaches, particularly a naïve scan approach, based on simple thresholding, and a modified version of the threshold random walk approach, to which it performed comparably. Combining the random walk approach with the new approach produced very good results, reducing the number of false negatives to zero.

History

Date

1998-01-01

Usage metrics

    Exports

    RefWorks
    BibTeX
    Ref. manager
    Endnote
    DataCite
    NLM
    DC