Mining and detecting connection-chains in network traffic

Ahmad Almulhem*, Issa Traore

*Corresponding author for this work

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

3 Scopus citations

Abstract

A connection-chain refers to the set of connections created by sequentially logging into a series of hosts. Attackers typically use connection chains to indirectly carry their attacks and stay anonymous. In this paper, we proposed a host-based algorithm to detect connection chains by passively monitoring inbound and outbound packets. In particular, we employ concepts from association rule mining in the data mining literature. The proposed approach is first explained in details. We then present our evaluations of the approach in terms of real-time and detection performance. Our experimentations suggest that the algorithm is suitable for real-time operation, because the average processing time per packet is both constant and low. We also show that by appropriately setting underlying parameters we can achieve perfect detection.

Original languageEnglish
Title of host publicationTrust Management
Subtitle of host publicationProceedings of IFIPTM 2007: Joint iTrust and PST Conferences on Privacy, Trust Management and Security, July 30- August 2, 2007, New Brunswick, Canada
EditorsSandro Etalle, Stephen Marsh
Pages47-57
Number of pages11
DOIs
StatePublished - 2007
Externally publishedYes

Publication series

NameIFIP International Federation for Information Processing
Volume238
ISSN (Print)1571-5736

Keywords

  • Connection chain
  • Network security
  • Networkforensics
  • Stepping stone
  • Traceback
  • Tracing

ASJC Scopus subject areas

  • Information Systems and Management

Fingerprint

Dive into the research topics of 'Mining and detecting connection-chains in network traffic'. Together they form a unique fingerprint.

Cite this