{"title":"使用贝叶斯决策来检测慢扫描","authors":"I. Shimada, Yu Tsuda, Masashi Eto, D. Inoue","doi":"10.1109/BADGERS.2015.015","DOIUrl":null,"url":null,"abstract":"In a targeted cyberattack, attackers perform a search for vulnerable hosts in the internal network of targeting organization. Then, they try to increase the number of hosts that can be used as stepping stone for further attacks. Attackers would like to perform these activities in hidden from networkbased security appliances such as firewalls and network intrusion detection systems (NIDSs). One of the methods to hide their reconnaissance is a slow scan, which can be search and spread over several months mixed with large-scale normal live traffic. The method is very simple but it is effective to evade general firewalls or NIDSs. In this paper, we focus on a slow scan activities and we propose a simple and an efficient approach to detect a slow scan using Bayesian decision making within live network traffic. Our method enables to detect a slow scan as early as possible and to stop attackers' reconnoitering the internal network quickly.","PeriodicalId":150208,"journal":{"name":"2015 4th International Workshop on Building Analysis Datasets and Gathering Experience Returns for Security (BADGERS)","volume":"46 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2015-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":"{\"title\":\"Using Bayesian Decision Making to Detect Slow Scans\",\"authors\":\"I. Shimada, Yu Tsuda, Masashi Eto, D. Inoue\",\"doi\":\"10.1109/BADGERS.2015.015\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"In a targeted cyberattack, attackers perform a search for vulnerable hosts in the internal network of targeting organization. Then, they try to increase the number of hosts that can be used as stepping stone for further attacks. Attackers would like to perform these activities in hidden from networkbased security appliances such as firewalls and network intrusion detection systems (NIDSs). One of the methods to hide their reconnaissance is a slow scan, which can be search and spread over several months mixed with large-scale normal live traffic. The method is very simple but it is effective to evade general firewalls or NIDSs. In this paper, we focus on a slow scan activities and we propose a simple and an efficient approach to detect a slow scan using Bayesian decision making within live network traffic. Our method enables to detect a slow scan as early as possible and to stop attackers' reconnoitering the internal network quickly.\",\"PeriodicalId\":150208,\"journal\":{\"name\":\"2015 4th International Workshop on Building Analysis Datasets and Gathering Experience Returns for Security (BADGERS)\",\"volume\":\"46 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2015-11-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"2\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2015 4th International Workshop on Building Analysis Datasets and Gathering Experience Returns for Security (BADGERS)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/BADGERS.2015.015\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2015 4th International Workshop on Building Analysis Datasets and Gathering Experience Returns for Security (BADGERS)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/BADGERS.2015.015","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Using Bayesian Decision Making to Detect Slow Scans
In a targeted cyberattack, attackers perform a search for vulnerable hosts in the internal network of targeting organization. Then, they try to increase the number of hosts that can be used as stepping stone for further attacks. Attackers would like to perform these activities in hidden from networkbased security appliances such as firewalls and network intrusion detection systems (NIDSs). One of the methods to hide their reconnaissance is a slow scan, which can be search and spread over several months mixed with large-scale normal live traffic. The method is very simple but it is effective to evade general firewalls or NIDSs. In this paper, we focus on a slow scan activities and we propose a simple and an efficient approach to detect a slow scan using Bayesian decision making within live network traffic. Our method enables to detect a slow scan as early as possible and to stop attackers' reconnoitering the internal network quickly.