Transport Traffic Analysis for Abusive Infrastructure Characterization
Approved for public release; distribution is unlimited === This thesis investigates a novel approach to identifying discriminating features of communications involving abusive hosts. The technique uses per-packet TCP header and timing features to identify congestion, flow-control, and other low-lev...
Main Author: | |
---|---|
Other Authors: | |
Published: |
Monterey, California. Naval Postgraduate School
2012
|
Online Access: | http://hdl.handle.net/10945/17429 |
id |
ndltd-nps.edu-oai-calhoun.nps.edu-10945-17429 |
---|---|
record_format |
oai_dc |
spelling |
ndltd-nps.edu-oai-calhoun.nps.edu-10945-174292015-08-06T16:03:06Z Transport Traffic Analysis for Abusive Infrastructure Characterization Nolan, Le E. Beverly, Robert Young, Joel D. Computer Science Approved for public release; distribution is unlimited This thesis investigates a novel approach to identifying discriminating features of communications involving abusive hosts. The technique uses per-packet TCP header and timing features to identify congestion, flow-control, and other low-level network and system characteristics. These characteristics are inherent to the poorly connected, under-provisioned, low-end, and overloaded hosts or links typical of abusive infrastructure making them difficult for an adversary to manipulate. Supervised classifiers use these features to infer likely abusive network hosts. Prior work investigates such features to opportunistically identify inbound abusive traffic, this thesis seeks to perform active probing to generally characterize abusive infrastructure. Our approach is IP address and content agnostic, and therefore privacy-preserving to permit wider deployment than known-abusive web sites, we achieve a classification accuracy of 94 percent with a 3 percent false positive rate using only transport features. Our results suggest that transport traffic analysis can block and identify, in real-time, abusive hosts unknown to blocklists, and provide a difficult-to-subvert addition to existing schemes. 2012-11-14T00:02:55Z 2012-11-14T00:02:55Z 2012-09 Thesis http://hdl.handle.net/10945/17429 This publication is a work of the U.S. Government as defined
in Title 17, United States Code, Section 101. As such, it is in the
public domain, and under the provisions of Title 17, United States
Code, Section 105, is not copyrighted in the U.S. Monterey, California. Naval Postgraduate School |
collection |
NDLTD |
sources |
NDLTD |
description |
Approved for public release; distribution is unlimited === This thesis investigates a novel approach to identifying discriminating features of communications involving abusive hosts. The technique uses per-packet TCP header and timing features to identify congestion, flow-control, and other low-level network and system characteristics. These characteristics are inherent to the poorly connected, under-provisioned, low-end, and overloaded hosts or links typical of abusive infrastructure making them difficult for an adversary to manipulate. Supervised classifiers use these features to infer likely abusive network hosts. Prior work investigates such features to opportunistically identify inbound abusive traffic, this thesis seeks to perform active probing to generally characterize abusive infrastructure. Our approach is IP address and content agnostic, and therefore privacy-preserving to permit wider deployment than known-abusive web sites, we achieve a classification accuracy of 94 percent with a 3 percent false positive rate using only transport features. Our results suggest that transport traffic analysis can block and identify, in real-time, abusive hosts unknown to blocklists, and provide a difficult-to-subvert addition to existing schemes. |
author2 |
Beverly, Robert |
author_facet |
Beverly, Robert Nolan, Le E. |
author |
Nolan, Le E. |
spellingShingle |
Nolan, Le E. Transport Traffic Analysis for Abusive Infrastructure Characterization |
author_sort |
Nolan, Le E. |
title |
Transport Traffic Analysis for Abusive Infrastructure Characterization |
title_short |
Transport Traffic Analysis for Abusive Infrastructure Characterization |
title_full |
Transport Traffic Analysis for Abusive Infrastructure Characterization |
title_fullStr |
Transport Traffic Analysis for Abusive Infrastructure Characterization |
title_full_unstemmed |
Transport Traffic Analysis for Abusive Infrastructure Characterization |
title_sort |
transport traffic analysis for abusive infrastructure characterization |
publisher |
Monterey, California. Naval Postgraduate School |
publishDate |
2012 |
url |
http://hdl.handle.net/10945/17429 |
work_keys_str_mv |
AT nolanlee transporttrafficanalysisforabusiveinfrastructurecharacterization |
_version_ |
1716816335466397696 |