On the Detection and Origin Identification of Slow-Paced Attacks in Forensic Investigation
博士 === 國立臺灣大學 === 電機工程學研究所 === 101 === A slow-paced attack, such as slow worm or bot, can remain undetectable indefinitely by slowing down the pace of its movement. Detecting slow attacks based on traditional anomaly detection techniques may yield high false alarm rates. Moreover, the long lifespan...
Main Authors: | , |
---|---|
Other Authors: | |
Format: | Others |
Language: | en_US |
Published: |
2013
|
Online Access: | http://ndltd.ncl.edu.tw/handle/34688492506716645515 |
id |
ndltd-TW-101NTU05442052 |
---|---|
record_format |
oai_dc |
spelling |
ndltd-TW-101NTU054420522015-10-13T23:05:29Z http://ndltd.ncl.edu.tw/handle/34688492506716645515 On the Detection and Origin Identification of Slow-Paced Attacks in Forensic Investigation 鑑識分析之針對慢速攻擊之偵測與來源鑑定 Li-Ming Chen 陳力銘 博士 國立臺灣大學 電機工程學研究所 101 A slow-paced attack, such as slow worm or bot, can remain undetectable indefinitely by slowing down the pace of its movement. Detecting slow attacks based on traditional anomaly detection techniques may yield high false alarm rates. Moreover, the long lifespan of a slow-paced attack is also challenging the forensic investigation because it is hard to get a high quality dataset for the analysis. In this dissertation, we study the detection and forensics problems of a slow-paced attacks in the aspect of temporal and spatial analysis of network activities. We first discuss the problem and feasibility of back tracking the origin of a self-propagating stealth attack when given a network traffic trace for a sufficiently long period of time. We propose a network forensics mechanism that is scalable in computation time and space while maintaining high accuracy in the identification of the attack origin. We further develop a contact-based data reduction method to filter out attack-irrelevant data and only retain evidence relevant to potential attacks for a postmortem investigation. Using real-world trace driven experiments, we evaluate the performance of the proposed mechanism and show that we can trim down up to 97% of attack-irrelevant network traffic and successfully identify attack origin. For the forensics, we track outbound connections of hosts by using a time series. Our assumption is that since attacks are usually controlled by pre-programmed computer codes, their behaviors have regularity. Although the correlation among slow attacks'' connections is temporally weak; the regularity of these connections remains preserved in the time series. Accordingly, we focus on time series spectrum analysis, and propose a detection method to identify peculiar spectral patterns which can represent the occurrence of a recurring and persistent activity in the time domain. We use both synthesized traffic and real-world traffic to evaluate our method. The results show that our method is efficient and effective in detecting slow-paced persistent activities even in a noisy environment with legitimate traffic. Future attacks are anticipated to be more sophisticated and stealthy to evade intrusion detection techniques which aggravate the security risks. In this dissertation, we try to understand and defend the potential threat of a slow-paced stealthy attack in the aspect of malware detection and forensics. We find that although the attack behavior is blend in with a huge amount of legitimate events, we can still identify the evidence of the attack and enhance the security of the monitored network environment. Wanjiun Liao 廖婉君 2013 學位論文 ; thesis 85 en_US |
collection |
NDLTD |
language |
en_US |
format |
Others
|
sources |
NDLTD |
description |
博士 === 國立臺灣大學 === 電機工程學研究所 === 101 === A slow-paced attack, such as slow worm or bot, can remain undetectable indefinitely by slowing down the pace of its movement. Detecting slow attacks based on traditional anomaly detection techniques may yield high false alarm rates. Moreover, the long lifespan of a slow-paced attack is also challenging the forensic investigation because it is hard to get a high quality dataset for the analysis. In this dissertation, we study the detection and forensics problems of a slow-paced attacks in the aspect of temporal and spatial analysis of network activities.
We first discuss the problem and feasibility of back tracking the origin of a self-propagating stealth attack when given a network traffic trace for a sufficiently long period of time. We propose a network forensics mechanism that is scalable in computation time and space while maintaining high accuracy in the identification of the attack origin. We further develop a contact-based data reduction method to filter out attack-irrelevant data and only retain evidence relevant to potential attacks for a postmortem investigation. Using real-world trace driven experiments, we evaluate the performance of the proposed mechanism and show that we can trim down up to 97% of attack-irrelevant network traffic and successfully identify attack origin.
For the forensics, we track outbound connections of hosts by using a time series. Our assumption is that since attacks are usually controlled by pre-programmed computer codes, their behaviors have regularity. Although the correlation among slow attacks'' connections is temporally weak; the regularity of these connections remains preserved in the time series. Accordingly, we focus on time series spectrum analysis, and propose a detection method to identify peculiar spectral patterns which can represent the occurrence of a recurring and persistent activity in the time domain. We use both synthesized traffic and real-world traffic to evaluate our method. The results show that our method is efficient and effective in detecting slow-paced persistent activities even in a noisy environment with legitimate traffic.
Future attacks are anticipated to be more sophisticated and stealthy to evade intrusion detection techniques which aggravate the security risks. In this dissertation, we try to understand and defend the potential threat of a slow-paced stealthy attack in the aspect of malware detection and forensics. We find that although the attack behavior is blend in with a huge amount of legitimate events, we can still identify the evidence of the attack and enhance the security of the monitored network environment.
|
author2 |
Wanjiun Liao |
author_facet |
Wanjiun Liao Li-Ming Chen 陳力銘 |
author |
Li-Ming Chen 陳力銘 |
spellingShingle |
Li-Ming Chen 陳力銘 On the Detection and Origin Identification of Slow-Paced Attacks in Forensic Investigation |
author_sort |
Li-Ming Chen |
title |
On the Detection and Origin Identification of Slow-Paced Attacks in Forensic Investigation |
title_short |
On the Detection and Origin Identification of Slow-Paced Attacks in Forensic Investigation |
title_full |
On the Detection and Origin Identification of Slow-Paced Attacks in Forensic Investigation |
title_fullStr |
On the Detection and Origin Identification of Slow-Paced Attacks in Forensic Investigation |
title_full_unstemmed |
On the Detection and Origin Identification of Slow-Paced Attacks in Forensic Investigation |
title_sort |
on the detection and origin identification of slow-paced attacks in forensic investigation |
publishDate |
2013 |
url |
http://ndltd.ncl.edu.tw/handle/34688492506716645515 |
work_keys_str_mv |
AT limingchen onthedetectionandoriginidentificationofslowpacedattacksinforensicinvestigation AT chénlìmíng onthedetectionandoriginidentificationofslowpacedattacksinforensicinvestigation AT limingchen jiànshífēnxīzhīzhēnduìmànsùgōngjīzhīzhēncèyǔláiyuánjiàndìng AT chénlìmíng jiànshífēnxīzhīzhēnduìmànsùgōngjīzhīzhēncèyǔláiyuánjiàndìng |
_version_ |
1718083844649779200 |