Large enterprises are nowadays complex interconnected software systems spanning over several domains. This new dimension makes difficult for enterprises the task of enabling efficient security defenses. This paper addresses the problem of detecting inter-domain stealthy port scans and proposes an architecture of an Intrusion Detection System which uses, for such purpose, an open source Complex Event Processing engine named Esper. Esper provides low cost of ownership and high flexibility. The architecture consists of software sensors deployed at different enterprise domains. Each sensor sends events to the Esper event processor for correlation. We implemented an algorithm for the detection of interdomain SYN port scans named Rank-based SYN (R-SYN) port scan detection algorithm. It combines and adapts three detection techniques in order to obtain a unique global statement about the malicious behavior of host activities. An evaluation of the accuracy of our approach has been carried out using several traces, some of which including original traffic dumps, some others altered by injecting packets that simulate port scan activities. Accuracy results show that our algorithm is able to produce a list of scanners characterized by high detection and low false positive rates. Copyright © 2011 ACM.

Inter-domain stealthy port scan detection through complex event processing / Aniello, Leonardo; Giorgia, Lodi; Baldoni, Roberto. - STAMPA. - (2011), pp. 67-72. (Intervento presentato al convegno 13th European Workshop on Dependable Computing, EWDC 2011 tenutosi a Pisa nel 11 May 2011 through 12 May 2011) [10.1145/1978582.1978597].

Inter-domain stealthy port scan detection through complex event processing

ANIELLO, LEONARDO;BALDONI, Roberto
2011

Abstract

Large enterprises are nowadays complex interconnected software systems spanning over several domains. This new dimension makes difficult for enterprises the task of enabling efficient security defenses. This paper addresses the problem of detecting inter-domain stealthy port scans and proposes an architecture of an Intrusion Detection System which uses, for such purpose, an open source Complex Event Processing engine named Esper. Esper provides low cost of ownership and high flexibility. The architecture consists of software sensors deployed at different enterprise domains. Each sensor sends events to the Esper event processor for correlation. We implemented an algorithm for the detection of interdomain SYN port scans named Rank-based SYN (R-SYN) port scan detection algorithm. It combines and adapts three detection techniques in order to obtain a unique global statement about the malicious behavior of host activities. An evaluation of the accuracy of our approach has been carried out using several traces, some of which including original traffic dumps, some others altered by injecting packets that simulate port scan activities. Accuracy results show that our algorithm is able to produce a list of scanners characterized by high detection and low false positive rates. Copyright © 2011 ACM.
2011
13th European Workshop on Dependable Computing, EWDC 2011
complex event processing; intrusion detection systems; port scan
04 Pubblicazione in atti di convegno::04b Atto di convegno in volume
Inter-domain stealthy port scan detection through complex event processing / Aniello, Leonardo; Giorgia, Lodi; Baldoni, Roberto. - STAMPA. - (2011), pp. 67-72. (Intervento presentato al convegno 13th European Workshop on Dependable Computing, EWDC 2011 tenutosi a Pisa nel 11 May 2011 through 12 May 2011) [10.1145/1978582.1978597].
File allegati a questo prodotto
File Dimensione Formato  
VE_2011_11573-415891.pdf

solo gestori archivio

Tipologia: Versione editoriale (versione pubblicata con il layout dell'editore)
Licenza: Tutti i diritti riservati (All rights reserved)
Dimensione 208.64 kB
Formato Adobe PDF
208.64 kB Adobe PDF   Contatta l'autore

I documenti in IRIS sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione.

Utilizza questo identificativo per citare o creare un link a questo documento: https://hdl.handle.net/11573/415891
 Attenzione

Attenzione! I dati visualizzati non sono stati sottoposti a validazione da parte dell'ateneo

Citazioni
  • ???jsp.display-item.citation.pmc??? ND
  • Scopus 12
  • ???jsp.display-item.citation.isi??? ND
social impact