Detector SherLOCK: Enhancing TRW with Bloom filters under memory and performance constraints

Cited 2 time in webofscience Cited 0 time in scopus
  • Hit : 334
  • Download : 0
DC FieldValueLanguage
dc.contributor.authorNam S.Y.ko
dc.contributor.authorKim H.-D.ko
dc.contributor.authorKim H.S.ko
dc.date.accessioned2013-03-06T16:18:03Z-
dc.date.available2013-03-06T16:18:03Z-
dc.date.created2012-02-06-
dc.date.created2012-02-06-
dc.date.issued2008-
dc.identifier.citationCOMPUTER NETWORKS, v.52, no.8, pp.1545 - 1566-
dc.identifier.issn1389-1286-
dc.identifier.urihttp://hdl.handle.net/10203/87563-
dc.description.abstractComputer worms and bots are significant threats to large networks because they can spread very rapidly and are used for DDoS. The first phase of worms and bots begins by scanning vulnerable hosts. Missing on-going scanning activity can significantly deteriorate network performance. We propose a new scanning detection scheme, SherLOCK, based on the connection attempt success ratio. The proposed scheme can detect scanners with guaranteed false positive and false negative probabilities and with a limited memory size. Detection of scanners at high-speed links requires a high-speed memory and such memory devices are expensive and limited in size. We reduce the memory requirement by applying the Bloom filter, We show how slow scanner, can be detected with a guaranteed performance for a given offered traffic load and memory size. This study can help to design the system that satisfies the target performance requirement. The detection performance is guaranteed under the assumption that malicious scanners and benign hosts have distinct behaviors in terms of the connection success ratio. We extend the proposed detector with a sampling mechanism to detect more intelligent scanners with guaranteed performance. These include scanners that use a list of pre-acquired IP addresses. We evaluate the performance of the proposed scheme through experiment using well-known traffic traces. (C) 2008 Elsevier B.V. All rights reserved.-
dc.languageEnglish-
dc.publisherELSEVIER SCIENCE BV-
dc.titleDetector SherLOCK: Enhancing TRW with Bloom filters under memory and performance constraints-
dc.typeArticle-
dc.identifier.wosid000256133200002-
dc.identifier.scopusid2-s2.0-42049106617-
dc.type.rimsART-
dc.citation.volume52-
dc.citation.issue8-
dc.citation.beginningpage1545-
dc.citation.endingpage1566-
dc.citation.publicationnameCOMPUTER NETWORKS-
dc.identifier.doi10.1016/j.comnet.2008.01.008-
dc.contributor.localauthorKim H.-D.-
dc.contributor.nonIdAuthorNam S.Y.-
dc.contributor.nonIdAuthorKim H.S.-
dc.type.journalArticleArticle-
dc.subject.keywordAuthorscanner-
dc.subject.keywordAuthorslow scanner-
dc.subject.keywordAuthorscanner detection-
dc.subject.keywordAuthorconnection attempt success ratio-
dc.subject.keywordAuthorBloom filter-
dc.subject.keywordAuthormemory conflict-
Appears in Collection
RIMS Journal Papers
Files in This Item
There are no files associated with this item.
This item is cited by other documents in WoS
⊙ Detail Information in WoSⓡ Click to see webofscience_button
⊙ Cited 2 items in WoS Click to see citing articles in records_button

qr_code

  • mendeley

    citeulike


rss_1.0 rss_2.0 atom_1.0