A practical approach to portscan detection in very high-speed links
Tipo de documentoTexto en actas de congreso
Fecha de publicación2011
Condiciones de accesoAcceso restringido por política de la editorial
Port scans are continuously used by both worms and human attackers to probe for vulnerabilities in Internet facing systems. In this paper, we present a new method to efficiently detect TCP port scans in very high-speed links. The main idea behind our approach is to early discard those handshake packets that are not strictly needed to reliably detect port scans. We show that with just a couple of Bloom filters to track active servers and TCP handshakes we can easily discard about 85% of all handshake packets with negligible loss in accuracy. This significantly reduces both the memory requirements and CPU cost per packet. We evaluated our algorithm using packet traces and live traffic from 1 and 10 GigE academic networks. Our results show that our method requires less than 1 MB to accurately monitor a 10 Gb/s link, which perfectly fits in the cache memory of nowadays’ general-purpose processors.
CitaciónMikians, J. [et al.]. A practical approach to portscan detection in very high-speed links. A: International Conference on Passive and Active Measurement. "12th International Conference on Passive and Active Measurement". Springer Verlag, 2011, p. 112-121.
Versión del editorhttp://www.springerlink.com/content/m7x721553k62w312/
|A practical approach to portscan detection ....pdf||258.8Kb||Acceso restringido|