Exposure maps: removing reliance on attribution during scan detection

  • Authors:
  • David Whyte;P. C. van Oorschot;Evangelos Kranakis

  • Affiliations:
  • Carleton University;Carleton University;Carleton University

  • Venue:
  • HOTSEC'06 Proceedings of the 1st USENIX Workshop on Hot Topics in Security
  • Year:
  • 2006

Quantified Score

Hi-index 0.00

Visualization

Abstract

Current scanning detection algorithms are based on an underlying assumption that scanning activity can be attributed to a meaningful specific source (i.e. the root cause or scan controller). Sophisticated scanning activity including the use of botnets, idle scanning, and throwaway systems violates this assumption. We propose a class of scanning detection algorithms that focus on what is being scanned for instead of who is performing the scanning. We pursue this idea, introduce the concept of exposuremaps, and report on a preliminary proof-of-concept that allows one to: (1) estimate the information or exposures revealed to an adversary as a result of scanning activity; (2) detect sophisticated or targeted scanning activity with a footprint as low as a single packet or event; and (3) discover real-time changes in network exposures that may be indicative of a successful attack.