Abnormality metrics to detect and protect against network attacks

Internet has been growing at an amazing rate and it becomes pervasive in all aspects of our life. On the other hand, the ubiquity of networked computers and their services has significantly increased their vulnerability to virus and worm attacks. To make pervasive systems and their services reliable...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Hauptverfasser: Guangzhi Qu, Hariri, S., Jangiti, S., Hussain, S., Seungchan Oh, Fayssal, S., Yousif, M.
Format: Tagungsbericht
Sprache:eng
Schlagworte:
Online-Zugang:Volltext bestellen
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page 111
container_issue
container_start_page 105
container_title
container_volume
creator Guangzhi Qu
Hariri, S.
Jangiti, S.
Hussain, S.
Seungchan Oh
Fayssal, S.
Yousif, M.
description Internet has been growing at an amazing rate and it becomes pervasive in all aspects of our life. On the other hand, the ubiquity of networked computers and their services has significantly increased their vulnerability to virus and worm attacks. To make pervasive systems and their services reliable and secure it becomes highly essential to develop on-line monitoring, analysis, and quantification of the operational state of such systems and services under a wide range of normal and abnormal workload scenarios. We prevent several abnormality metrics that can be used to detect abnormal behaviors and also can be used to quantify the impact of attach on pervasive system sendees. Our online monitoring approach is based on deploying software agents on selected routers, clients and servers to continuously monitor the measurement attributes and compute the abnormality metrics. Further, we use this metrics to quantify the impact of attacks on the individual components and on the system as a whole. This analysis leads to identify the most critical components in the system. We have built a test bed to experiment and evaluate the effectiveness of these metrics to detect several well-known network attacks such as MS SQL slammer worm attack, Denial of Service attack, and email worm spam.
doi_str_mv 10.1109/PERSER.2004.1356777
format Conference Proceeding
fullrecord <record><control><sourceid>ieee_6IE</sourceid><recordid>TN_cdi_ieee_primary_1356777</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>1356777</ieee_id><sourcerecordid>1356777</sourcerecordid><originalsourceid>FETCH-LOGICAL-i175t-d3b8e73bf66058eb9ad0d08e468359f705374da710d58d5faf45f517d5f5a3e93</originalsourceid><addsrcrecordid>eNotj8tqwzAQRQWl0DbNF2SjH3A6ijweeWmC-4BAS9qug2yNiprYDpKg5O8bSM7mntWFI8RCwVIpqJ8-2u1nu12uAMql0lgR0Y14ADKgDRKt7sQ8pV84o2s0lbkXTdONUxzsIeSTHDjH0CeZJ-k4c5-lHZ08xuniPzaMKcuR898U99LmbPt9ehS33h4Sz687E9_P7df6tdi8v7ytm00RFGEunO4Mk-58VQEa7mrrwIHhsjIaa0-AmkpnSYFD49BbX6JHRWdFq7nWM7G4_AZm3h1jGGw87a6V-h9F_0lT</addsrcrecordid><sourcetype>Publisher</sourcetype><iscdi>true</iscdi><recordtype>conference_proceeding</recordtype></control><display><type>conference_proceeding</type><title>Abnormality metrics to detect and protect against network attacks</title><source>IEEE Electronic Library (IEL) Conference Proceedings</source><creator>Guangzhi Qu ; Hariri, S. ; Jangiti, S. ; Hussain, S. ; Seungchan Oh ; Fayssal, S. ; Yousif, M.</creator><creatorcontrib>Guangzhi Qu ; Hariri, S. ; Jangiti, S. ; Hussain, S. ; Seungchan Oh ; Fayssal, S. ; Yousif, M.</creatorcontrib><description>Internet has been growing at an amazing rate and it becomes pervasive in all aspects of our life. On the other hand, the ubiquity of networked computers and their services has significantly increased their vulnerability to virus and worm attacks. To make pervasive systems and their services reliable and secure it becomes highly essential to develop on-line monitoring, analysis, and quantification of the operational state of such systems and services under a wide range of normal and abnormal workload scenarios. We prevent several abnormality metrics that can be used to detect abnormal behaviors and also can be used to quantify the impact of attach on pervasive system sendees. Our online monitoring approach is based on deploying software agents on selected routers, clients and servers to continuously monitor the measurement attributes and compute the abnormality metrics. Further, we use this metrics to quantify the impact of attacks on the individual components and on the system as a whole. This analysis leads to identify the most critical components in the system. We have built a test bed to experiment and evaluate the effectiveness of these metrics to detect several well-known network attacks such as MS SQL slammer worm attack, Denial of Service attack, and email worm spam.</description><identifier>ISBN: 0780385772</identifier><identifier>ISBN: 9780780385771</identifier><identifier>DOI: 10.1109/PERSER.2004.1356777</identifier><language>eng</language><publisher>IEEE</publisher><subject>Computer crime ; Computer network reliability ; Computer networks ; Computer worms ; Computerized monitoring ; Internet ; Protection ; Software agents ; Software measurement ; Testing</subject><ispartof>The IEEE/ACS International Conference onPervasive Services, 2004. ICPS 2004. Proceedings, 2004, p.105-111</ispartof><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/1356777$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>309,310,780,784,789,790,2058,4050,4051,27925,54920</link.rule.ids><linktorsrc>$$Uhttps://ieeexplore.ieee.org/document/1356777$$EView_record_in_IEEE$$FView_record_in_$$GIEEE</linktorsrc></links><search><creatorcontrib>Guangzhi Qu</creatorcontrib><creatorcontrib>Hariri, S.</creatorcontrib><creatorcontrib>Jangiti, S.</creatorcontrib><creatorcontrib>Hussain, S.</creatorcontrib><creatorcontrib>Seungchan Oh</creatorcontrib><creatorcontrib>Fayssal, S.</creatorcontrib><creatorcontrib>Yousif, M.</creatorcontrib><title>Abnormality metrics to detect and protect against network attacks</title><title>The IEEE/ACS International Conference onPervasive Services, 2004. ICPS 2004. Proceedings</title><addtitle>PERSER</addtitle><description>Internet has been growing at an amazing rate and it becomes pervasive in all aspects of our life. On the other hand, the ubiquity of networked computers and their services has significantly increased their vulnerability to virus and worm attacks. To make pervasive systems and their services reliable and secure it becomes highly essential to develop on-line monitoring, analysis, and quantification of the operational state of such systems and services under a wide range of normal and abnormal workload scenarios. We prevent several abnormality metrics that can be used to detect abnormal behaviors and also can be used to quantify the impact of attach on pervasive system sendees. Our online monitoring approach is based on deploying software agents on selected routers, clients and servers to continuously monitor the measurement attributes and compute the abnormality metrics. Further, we use this metrics to quantify the impact of attacks on the individual components and on the system as a whole. This analysis leads to identify the most critical components in the system. We have built a test bed to experiment and evaluate the effectiveness of these metrics to detect several well-known network attacks such as MS SQL slammer worm attack, Denial of Service attack, and email worm spam.</description><subject>Computer crime</subject><subject>Computer network reliability</subject><subject>Computer networks</subject><subject>Computer worms</subject><subject>Computerized monitoring</subject><subject>Internet</subject><subject>Protection</subject><subject>Software agents</subject><subject>Software measurement</subject><subject>Testing</subject><isbn>0780385772</isbn><isbn>9780780385771</isbn><fulltext>true</fulltext><rsrctype>conference_proceeding</rsrctype><creationdate>2004</creationdate><recordtype>conference_proceeding</recordtype><sourceid>6IE</sourceid><sourceid>RIE</sourceid><recordid>eNotj8tqwzAQRQWl0DbNF2SjH3A6ijweeWmC-4BAS9qug2yNiprYDpKg5O8bSM7mntWFI8RCwVIpqJ8-2u1nu12uAMql0lgR0Y14ADKgDRKt7sQ8pV84o2s0lbkXTdONUxzsIeSTHDjH0CeZJ-k4c5-lHZ08xuniPzaMKcuR898U99LmbPt9ehS33h4Sz687E9_P7df6tdi8v7ytm00RFGEunO4Mk-58VQEa7mrrwIHhsjIaa0-AmkpnSYFD49BbX6JHRWdFq7nWM7G4_AZm3h1jGGw87a6V-h9F_0lT</recordid><startdate>2004</startdate><enddate>2004</enddate><creator>Guangzhi Qu</creator><creator>Hariri, S.</creator><creator>Jangiti, S.</creator><creator>Hussain, S.</creator><creator>Seungchan Oh</creator><creator>Fayssal, S.</creator><creator>Yousif, M.</creator><general>IEEE</general><scope>6IE</scope><scope>6IL</scope><scope>CBEJK</scope><scope>RIE</scope><scope>RIL</scope></search><sort><creationdate>2004</creationdate><title>Abnormality metrics to detect and protect against network attacks</title><author>Guangzhi Qu ; Hariri, S. ; Jangiti, S. ; Hussain, S. ; Seungchan Oh ; Fayssal, S. ; Yousif, M.</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-i175t-d3b8e73bf66058eb9ad0d08e468359f705374da710d58d5faf45f517d5f5a3e93</frbrgroupid><rsrctype>conference_proceedings</rsrctype><prefilter>conference_proceedings</prefilter><language>eng</language><creationdate>2004</creationdate><topic>Computer crime</topic><topic>Computer network reliability</topic><topic>Computer networks</topic><topic>Computer worms</topic><topic>Computerized monitoring</topic><topic>Internet</topic><topic>Protection</topic><topic>Software agents</topic><topic>Software measurement</topic><topic>Testing</topic><toplevel>online_resources</toplevel><creatorcontrib>Guangzhi Qu</creatorcontrib><creatorcontrib>Hariri, S.</creatorcontrib><creatorcontrib>Jangiti, S.</creatorcontrib><creatorcontrib>Hussain, S.</creatorcontrib><creatorcontrib>Seungchan Oh</creatorcontrib><creatorcontrib>Fayssal, S.</creatorcontrib><creatorcontrib>Yousif, M.</creatorcontrib><collection>IEEE Electronic Library (IEL) Conference Proceedings</collection><collection>IEEE Proceedings Order Plan All Online (POP All Online) 1998-present by volume</collection><collection>IEEE Xplore All Conference Proceedings</collection><collection>IEEE Electronic Library (IEL)</collection><collection>IEEE Proceedings Order Plans (POP All) 1998-Present</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Guangzhi Qu</au><au>Hariri, S.</au><au>Jangiti, S.</au><au>Hussain, S.</au><au>Seungchan Oh</au><au>Fayssal, S.</au><au>Yousif, M.</au><format>book</format><genre>proceeding</genre><ristype>CONF</ristype><atitle>Abnormality metrics to detect and protect against network attacks</atitle><btitle>The IEEE/ACS International Conference onPervasive Services, 2004. ICPS 2004. Proceedings</btitle><stitle>PERSER</stitle><date>2004</date><risdate>2004</risdate><spage>105</spage><epage>111</epage><pages>105-111</pages><isbn>0780385772</isbn><isbn>9780780385771</isbn><abstract>Internet has been growing at an amazing rate and it becomes pervasive in all aspects of our life. On the other hand, the ubiquity of networked computers and their services has significantly increased their vulnerability to virus and worm attacks. To make pervasive systems and their services reliable and secure it becomes highly essential to develop on-line monitoring, analysis, and quantification of the operational state of such systems and services under a wide range of normal and abnormal workload scenarios. We prevent several abnormality metrics that can be used to detect abnormal behaviors and also can be used to quantify the impact of attach on pervasive system sendees. Our online monitoring approach is based on deploying software agents on selected routers, clients and servers to continuously monitor the measurement attributes and compute the abnormality metrics. Further, we use this metrics to quantify the impact of attacks on the individual components and on the system as a whole. This analysis leads to identify the most critical components in the system. We have built a test bed to experiment and evaluate the effectiveness of these metrics to detect several well-known network attacks such as MS SQL slammer worm attack, Denial of Service attack, and email worm spam.</abstract><pub>IEEE</pub><doi>10.1109/PERSER.2004.1356777</doi><tpages>7</tpages></addata></record>
fulltext fulltext_linktorsrc
identifier ISBN: 0780385772
ispartof The IEEE/ACS International Conference onPervasive Services, 2004. ICPS 2004. Proceedings, 2004, p.105-111
issn
language eng
recordid cdi_ieee_primary_1356777
source IEEE Electronic Library (IEL) Conference Proceedings
subjects Computer crime
Computer network reliability
Computer networks
Computer worms
Computerized monitoring
Internet
Protection
Software agents
Software measurement
Testing
title Abnormality metrics to detect and protect against network attacks
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2024-12-27T05%3A09%3A27IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-ieee_6IE&rft_val_fmt=info:ofi/fmt:kev:mtx:book&rft.genre=proceeding&rft.atitle=Abnormality%20metrics%20to%20detect%20and%20protect%20against%20network%20attacks&rft.btitle=The%20IEEE/ACS%20International%20Conference%20onPervasive%20Services,%202004.%20ICPS%202004.%20Proceedings&rft.au=Guangzhi%20Qu&rft.date=2004&rft.spage=105&rft.epage=111&rft.pages=105-111&rft.isbn=0780385772&rft.isbn_list=9780780385771&rft_id=info:doi/10.1109/PERSER.2004.1356777&rft_dat=%3Cieee_6IE%3E1356777%3C/ieee_6IE%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rft_ieee_id=1356777&rfr_iscdi=true