Detecting low-profile scans in TCP anomaly event data

  • Authors:
  • J. Treurniet

  • Affiliations:
  • Defence R&D Canada -- Ottawa, Ottawa, Ontario, Canada

  • Venue:
  • Proceedings of the 2006 International Conference on Privacy, Security and Trust: Bridge the Gap Between PST Technologies and Business Services
  • Year:
  • 2006

Quantified Score

Hi-index 0.00

Visualization

Abstract

Anomalous connections in TCP traffic can be detected using a finite state machine model that reflects the progression of a TCP connection through a sequence of states via its control flags. Anomalies generated by this model can be associated with scanning activity. By storing these anomalies over time, it is possible to identify the presence of scanning activity by sorting the data with respect to source address, destination address and destination port. In particular, low-profile (slow and/or distributed) scans can be identified. The 1999 DARPA data was used to test the method, with no false negatives. Operational data was injected with crafted slow scan anomalies to test the false negative rate; all were successfully detected, along with numerous real scans. The storage requirements of the system are quite small, giving the ability to store scans for extremely long periods of time.