1 / 1

Motivation: How to stop network abuse given a set of policies?

ISIS Lab. Motivation: How to stop network abuse given a set of policies? No encrypted traffic on network, besides SSH and HTTPS No outbound video or audio streams Types of abusers: Malicious outsider looking for free resources to host illegal activities Malicious insider running a P2P hub

Download Presentation

Motivation: How to stop network abuse given a set of policies?

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. ISIS Lab • Motivation: • How to stop network abuse given a set of policies? • No encrypted traffic on network, besides SSH and HTTPS • No outbound video or audio streams • Types of abusers: • Malicious outsider looking for free resources to host illegal activities • Malicious insider running a P2P hub • Ill informed user running application proxy Dataset: • Raw: TXT, BMP, WAV • Compressed: ZIP, JPEG, MP3, MPEG • Encrypted: AES encrypted files • 1000 files collected from each category using a P2P network • 16384 bytes of data sample from each file, at random location • Feature Selection: • Some of the 25 features will have little information gain • Less feature means faster but less system complexity • Used SFFS to identify the more important features • Entropy, Power in the first freq. band, Mean, Variance, mean and variance in the fourth freq. band Nabs: A System for Detecting Resource Abuses via Characterization of Flow Content TypeKulesh Shanmugasundaram, Mehdi Kharrazi, and Nasir Memon • Current solutions: • Block ports with firewall • Tunnel everything trough an open port • Use IDS • No signature available for content type • Check packet header • Packet containing header needs to be captured • Not all data types have headers, i.e. text, encrypted data • Header could be changed Accuracy before and after feature selection • Deployment: • Monitored Poly network for two weeks • 600 flows processed per sec. on average • Flow characterization takes about 945us • Detected abuses: • Unauthorized source of encrypted traffic • 9 hosts found being source of encrypted traffic • Waste a p2p application, which encrypts connections was being used • Unauthorized source of multimedia content • 16 hosts with heavy multimedia traffic detected • Further investigation revealed them as proxy servers • Nabs: • Use payload statistical properties to classify packets belonging to a set of possible content types. • Identifying statistics: • Time domain statistics • Mean, variance, auto-correlation, entropy • Frequency domain statistics • Power, mean, variance, and skewness of different frequency bands • Higher order statistics • used to characterize non-linearity • Mean and power of bicoherence magnitude • Power of bicoherence phase • Skewness, and kurtosis Scatter plot of statistics from 4 data categories • Classification: • A multi-class SVM is used • Two main ideas with support vector machines: • 1-Map the data to another dimension (kernels) • 2-Maximize the separating margins • For each data segment size: • 40% of data is used for training • The obtained classifier is tested on the rest of the unseen data Avg. Entropy Avg. Power infrequency band Avg. Skenewss Confusion matrix System Design

More Related