Dissecting Regular Connection Activities from Log Analysis in the Campus Network

碩士 === 國立中正大學 === 資訊工程研究所 === 106 === Log analysis is an important method of anomaly detection, and it is necessary to analyze abnormal behavior from various logs in a complex network. In a high-speed network (e.g., 40 ~ 100Gbps), the log volume becomes larger than ever. In this work, we proposed a...

Full description

Bibliographic Details
Main Authors: CHIU, CHING-HSIANG, 邱勁翔
Other Authors: LIN, PO-CHING
Format: Others
Language:en_US
Published: 2017
Online Access:http://ndltd.ncl.edu.tw/handle/58556z
Description
Summary:碩士 === 國立中正大學 === 資訊工程研究所 === 106 === Log analysis is an important method of anomaly detection, and it is necessary to analyze abnormal behavior from various logs in a complex network. In a high-speed network (e.g., 40 ~ 100Gbps), the log volume becomes larger than ever. In this work, we proposed a method based on Pearson's chi-squared testing and belief propagation to identify and analyze regular network activities, which typically come from automated programs. The hosts with such network activities may perform some kinds of automatic behaviors, including suspicious ones. We combine the features about port numbers and host names together with the connection regularity to find weird network activities in the network log. The analysis result is used as the feedback to update the monthly blacklist established in the belief propagation. In the evaluation from real network traffic in the campus of National Chung Cheng University from April to May 2017, we can find out the hosts with suspicious connections from highly regular ones. We can provide the list of suspicious activities to help the computer center pay attention to the hosts which are suspicious but not noticed and banned.