loading
Papers

Research.Publish.Connect.

Paper

Paper Unlock

Authors: Paulo Paulo ; António Nogueira ; Ulisses França and Rui Valadas

Affiliation: University of Aveiro, Instituto de Telecomunicações, Portugal

ISBN: 978-989-8111-59-3

Keyword(s): Intrusion Detection System, Firewalls, Port Matching, Protocol Analysis, Syntatic and Semantic Analysis, Traffic Signature, Traffic Pattern, Neural Networks.

Related Ontology Subjects/Areas/Topics: Information and Systems Security ; Information Assurance ; Intrusion Detection & Prevention ; Management of Computing Security ; Security Engineering ; Security in Information Systems ; Security Metrics and Measurement

Abstract: The detection of compromised hosts is currently performed at the network and host levels but any one of these options presents important security flaws: at the host level, antivirus, anti-spyware and personal firewalls are ineffective in the detection of hosts that are compromised via new or target-specific malicious software while at the network level network firewalls and Intrusion Detection Systems were developed to protect the network from external attacks but they were not designed to detect and protect against vulnerabilities that are already present inside the local area network. This paper presents a new approach for the identification of illicit traffic that tries to overcome some of the limitations of existing approaches, while being computationally efficient and easy to deploy. The approach is based on neural networks and is able to detect illicit traffic based on the historical traffic profiles presented by ”licit” and ”illicit” network applications. The evaluation of the proposed methodology relies on traffic traces obtained in a controlled environment and composed by licit traffic measured from normal activity of network applications and malicious traffic synthetically generated using the SubSeven backdoor. The results obtained show that the proposed methodology is able to achieve good identification results, being at the same time computationally efficient and easy to implement in real network scenarios. (More)

PDF ImageFull Text

Download
CC BY-NC-ND 4.0

Sign In Guest: Register as new SciTePress user now for free.

Sign In SciTePress user: please login.

PDF ImageMy Papers

You are not signed in, therefore limits apply to your IP address 18.210.22.132

In the current month:
Recent papers: 100 available of 100 total
2+ years older papers: 200 available of 200 total

Paper citation in several formats:
Paulo P.; Nogueira A.; França U.; Valadas R. and (2008). DETECTION OF ILLICIT TRAFFIC USING NEURAL NETWORKS.In Proceedings of the International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2008) ISBN 978-989-8111-59-3, pages 5-12. DOI: 10.5220/0001920800050012

@conference{secrypt08,
author={Paulo Paulo and António Nogueira and Ulisses Fran\c{C}a and Rui Valadas},
title={DETECTION OF ILLICIT TRAFFIC USING NEURAL NETWORKS},
booktitle={Proceedings of the International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2008)},
year={2008},
pages={5-12},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0001920800050012},
isbn={978-989-8111-59-3},
}

TY - CONF

JO - Proceedings of the International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2008)
TI - DETECTION OF ILLICIT TRAFFIC USING NEURAL NETWORKS
SN - 978-989-8111-59-3
AU - Paulo, P.
AU - Nogueira, A.
AU - França, U.
AU - Valadas, R.
PY - 2008
SP - 5
EP - 12
DO - 10.5220/0001920800050012

Login or register to post comments.

Comments on this Paper: Be the first to review this paper.