无线家庭网络中的行为分析

Kuai Xu, Feng Wang, Bin Wang
{"title":"无线家庭网络中的行为分析","authors":"Kuai Xu, Feng Wang, Bin Wang","doi":"10.1109/CCNC.2010.5421571","DOIUrl":null,"url":null,"abstract":"In recent years, the low cost of wireless technologies and residential broadband networks have driven the wide deployment of wireless home networks (WHNs). The ubiquitous availability of WHNs enables users the access to the Internet from everywhere within their homes. However, it also opens the doors for the drive-by hackers that exploit open access home networks for Internet connections [1]. Previous work such as [2] and our own measurement studies have shown the existence of a large amount of open or un-encrypted access points in wireless residential networks. For example, our recent measurement experiment finds an average of 35% are open home wireless networks in six residential buildings. At the same time, Internet attackers actively explore vulnerable home computers and turn them into part of botnets for sending spams or launching distributed denial of service (DoS) attacks [3]. The existing wireless access pointers from commercial vendors such as Linksys and Netgear are mostly built with NAT solutions and stateful packet inspection firewalls [4]. These techniques are very useful to filter attacks with known patterns, however they lack the ability to detect novel attacks or existing attacks with new variations. Therefore, it is very important to develop behavior-oriented techniques that do not rely on signatures for detecting such attacks. In this short paper, we present a preliminary design of a behavior profiling system in WHNs for network security monitoring. Figure 1 illustrates a schematic architecture of the behavior profiling system that is deployed in a typical wireless home network. The goals of the proposed behavior profiling system are to i) actively learn the traffic patterns of wireless home networks, ii) detect anomalous behavior from inside networks as well as from the Internet. Based on network traffic patterns for each computer, the system builds baseline behavior profiles, and subsequently detects events of interest through behavior deviations. The contributions of this work are two-fold. First, we propose to build the behavior profiles for each computer in WHNs towards a deep understanding of the traffic patterns in wireless residential networks. Secondly, we present a systematic architecture that aims to detect anomalous behavior through real-time traffic profiling. The reminder of this short paper is organized as follows. Section II presents our behavior profiling methodology that Fig. 1. Behavior profiling system for wireless home networks.","PeriodicalId":172400,"journal":{"name":"2010 7th IEEE Consumer Communications and Networking Conference","volume":"1763 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2010-01-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":"{\"title\":\"Behavior Profiling and Analysis in Wireless Home Networks\",\"authors\":\"Kuai Xu, Feng Wang, Bin Wang\",\"doi\":\"10.1109/CCNC.2010.5421571\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"In recent years, the low cost of wireless technologies and residential broadband networks have driven the wide deployment of wireless home networks (WHNs). The ubiquitous availability of WHNs enables users the access to the Internet from everywhere within their homes. However, it also opens the doors for the drive-by hackers that exploit open access home networks for Internet connections [1]. Previous work such as [2] and our own measurement studies have shown the existence of a large amount of open or un-encrypted access points in wireless residential networks. For example, our recent measurement experiment finds an average of 35% are open home wireless networks in six residential buildings. At the same time, Internet attackers actively explore vulnerable home computers and turn them into part of botnets for sending spams or launching distributed denial of service (DoS) attacks [3]. The existing wireless access pointers from commercial vendors such as Linksys and Netgear are mostly built with NAT solutions and stateful packet inspection firewalls [4]. These techniques are very useful to filter attacks with known patterns, however they lack the ability to detect novel attacks or existing attacks with new variations. Therefore, it is very important to develop behavior-oriented techniques that do not rely on signatures for detecting such attacks. In this short paper, we present a preliminary design of a behavior profiling system in WHNs for network security monitoring. Figure 1 illustrates a schematic architecture of the behavior profiling system that is deployed in a typical wireless home network. The goals of the proposed behavior profiling system are to i) actively learn the traffic patterns of wireless home networks, ii) detect anomalous behavior from inside networks as well as from the Internet. Based on network traffic patterns for each computer, the system builds baseline behavior profiles, and subsequently detects events of interest through behavior deviations. The contributions of this work are two-fold. First, we propose to build the behavior profiles for each computer in WHNs towards a deep understanding of the traffic patterns in wireless residential networks. Secondly, we present a systematic architecture that aims to detect anomalous behavior through real-time traffic profiling. The reminder of this short paper is organized as follows. Section II presents our behavior profiling methodology that Fig. 1. Behavior profiling system for wireless home networks.\",\"PeriodicalId\":172400,\"journal\":{\"name\":\"2010 7th IEEE Consumer Communications and Networking Conference\",\"volume\":\"1763 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2010-01-09\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"2\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2010 7th IEEE Consumer Communications and Networking Conference\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/CCNC.2010.5421571\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2010 7th IEEE Consumer Communications and Networking Conference","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/CCNC.2010.5421571","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 2

摘要

近年来,无线技术和住宅宽带网络的低成本推动了无线家庭网络(whn)的广泛部署。whn无处不在的可用性使用户能够从家中的任何地方访问互联网。然而,这也为黑客们打开了大门,他们利用开放的家庭网络来获取互联网连接b[1]。以前的工作,如[2]和我们自己的测量研究表明,在无线住宅网络中存在大量开放或未加密的接入点。例如,我们最近的测量实验发现,在六栋住宅楼中,平均有35%的家庭无线网络是开放的。与此同时,互联网攻击者积极探索易受攻击的家庭计算机,将其变成僵尸网络的一部分,发送垃圾邮件或发起分布式拒绝服务攻击b[3]。来自Linksys和Netgear等商业供应商的现有无线访问指针大多采用NAT解决方案和状态包检测防火墙[4]。这些技术对于过滤具有已知模式的攻击非常有用,但是它们缺乏检测新攻击或具有新变体的现有攻击的能力。因此,开发不依赖于签名的面向行为的技术来检测此类攻击是非常重要的。在这篇短文中,我们提出了一个用于网络安全监控的whn行为分析系统的初步设计。图1说明了部署在典型无线家庭网络中的行为分析系统的示意图架构。所提出的行为分析系统的目标是i)主动学习无线家庭网络的流量模式,ii)检测来自内部网络以及来自互联网的异常行为。基于每台计算机的网络流量模式,系统构建基线行为概况,并随后通过行为偏差检测感兴趣的事件。这项工作的贡献是双重的。首先,我们建议建立whn中每台计算机的行为概况,以深入了解无线住宅网络中的流量模式。其次,我们提出了一个旨在通过实时流量分析检测异常行为的系统架构。这篇短文的提示如下。第二节介绍了我们的行为分析方法,图1。用于无线家庭网络的行为分析系统。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
Behavior Profiling and Analysis in Wireless Home Networks
In recent years, the low cost of wireless technologies and residential broadband networks have driven the wide deployment of wireless home networks (WHNs). The ubiquitous availability of WHNs enables users the access to the Internet from everywhere within their homes. However, it also opens the doors for the drive-by hackers that exploit open access home networks for Internet connections [1]. Previous work such as [2] and our own measurement studies have shown the existence of a large amount of open or un-encrypted access points in wireless residential networks. For example, our recent measurement experiment finds an average of 35% are open home wireless networks in six residential buildings. At the same time, Internet attackers actively explore vulnerable home computers and turn them into part of botnets for sending spams or launching distributed denial of service (DoS) attacks [3]. The existing wireless access pointers from commercial vendors such as Linksys and Netgear are mostly built with NAT solutions and stateful packet inspection firewalls [4]. These techniques are very useful to filter attacks with known patterns, however they lack the ability to detect novel attacks or existing attacks with new variations. Therefore, it is very important to develop behavior-oriented techniques that do not rely on signatures for detecting such attacks. In this short paper, we present a preliminary design of a behavior profiling system in WHNs for network security monitoring. Figure 1 illustrates a schematic architecture of the behavior profiling system that is deployed in a typical wireless home network. The goals of the proposed behavior profiling system are to i) actively learn the traffic patterns of wireless home networks, ii) detect anomalous behavior from inside networks as well as from the Internet. Based on network traffic patterns for each computer, the system builds baseline behavior profiles, and subsequently detects events of interest through behavior deviations. The contributions of this work are two-fold. First, we propose to build the behavior profiles for each computer in WHNs towards a deep understanding of the traffic patterns in wireless residential networks. Secondly, we present a systematic architecture that aims to detect anomalous behavior through real-time traffic profiling. The reminder of this short paper is organized as follows. Section II presents our behavior profiling methodology that Fig. 1. Behavior profiling system for wireless home networks.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信