An evaluation of connection characteristics for separating network attacks

  • Authors:
  • Robin Berthier;Michel Cukier

  • Affiliations:
  • Center for Risk and Reliability, Department of Mechanical Engineering, University of Maryland, MD 20742, USA.;Center for Risk and Reliability, Department of Mechanical Engineering, University of Maryland, MD 20742, USA

  • Venue:
  • International Journal of Security and Networks
  • Year:
  • 2009

Quantified Score

Hi-index 0.00

Visualization

Abstract

The goal of this paper is to evaluate the efficiency of connection characteristics to separate different attack families that target a single TCP port. Identifying the most relevant characteristics might allow statistically separating attack families without systematically using forensics. This study is based on a dataset collected over 117 days using a test-bed of two high interaction honeypots. The results indicated that to separate unsuccessful from successful attacks in malicious traffic: the number of bytes is a relevant characteristic; time-based characteristics are poor characteristics; using combinations of characteristics does not improve the efficiency of separating attacks.