[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
10.1145/781027.781045acmconferencesArticle/Chapter ViewAbstractPublication PagesmetricsConference Proceedingsconference-collections
Article

Internet intrusions: global characteristics and prevalence

Published: 10 June 2003 Publication History

Abstract

Network intrusions have been a fact of life in the Internet for many years. However, as is the case with many other types of Internet-wide phenomena, gaining insight into the global characteristics of intrusions is challenging. In this paper we address this problem by systematically analyzing a set of firewall logs collected over four months from over 1600 different networks world wide. The first part of our study is a general analysis focused on the issues of distribution, categorization and prevalence of intrusions. Our data shows both a large quantity and wide variety of intrusion attempts on a daily basis. We also find that worms like CodeRed, Nimda and SQL Snake persist long after their original release. By projecting intrusion activity as seen in our data sets to the entire Internet we determine that there are typically on the order of 25B intrusion attempts per day and that there is an increasing trend over our measurement period. We further find that sources of intrusions are uniformly spread across the Autonomous System space. However, deeper investigation reveals that a very small collection of sources are responsible for a significant fraction of intrusion attempts in any given month and their on/off patterns exhibit cliques of correlated behavior. We show that the distribution of source IP addresses of the non-worm intrusions as a function of the number of attempts follows Zipf's law. We also find that at daily timescales, intrusion targets often depict significant spatial trends that blur patterns observed from individual "IP telescopes"; this underscores the necessity for a more global approach to intrusion detection. Finally, we investigate the benefits of shared information, and the potential for using this as a foundation for an automated, global intrusion detection framework that would identify and isolate intrusions with greater precision and robustness than systems with limited perspective.

References

[1]
George Bakos. SQLsnake code analysis. http://www.incidents.org/diary/diary.php? -- id = 157, 2002.
[2]
Paul Barford, Azer Bestavros, John Byers, and Mark Crovella. On the marginal utility of network topology measurements. In Proceedings of ACM SIGCOMM Internet Measurement Workshop, San Francisco, CA, November 2001.
[3]
CAIDA. CodeRed Worms a Global Threat. http://www.caida.org/analysis/security/code -- red/, 2001.
[4]
CERT Coordination Center. http://www.cert.org, 2001.
[5]
James Cowie, Andy T. Ogielski, B. J. Premore, and Yougu Yuan. Global Routing Instabilities Triggered by CodeRed II and Nimda Worm Attacks. http://www.renesys.com/projects/bgp_instability, 2001.
[6]
Frederic Cuppens and Alexandre Miege. Alert correlation in a cooperative intrusion detection framework. In Proceedings of IEEE Symposium on Security and Privacy, 2002.
[7]
Kevin Van Dixon. Spoof bounce. http://rr.sans.org/intrusion/spoof.php, 2001.
[8]
Michalis Faloutsos, Petros Faloutsos, and Christos Faloutsos. On power-law relationships of the internet topology. In Proceedings of ACM SIGCOMM, 1999.
[9]
Robert Gray. Entrophy and Information Theory. Springer-Verlag, 1990.
[10]
HoneyNet Project. Know Your Enemy: Honeynets. http://project.honeynet.org, 2001.
[11]
Brad Huffaker, Andre Broido, Kim Claffy, Marina Fomenkov, Sean McCreary, David Moore, and Oliver Jakubiec. Visualizing internet topology at a macrosocopic scale. http://www.caida.org/--analysis/topology/as_core_network/about.xml/, 2001.
[12]
Eeye Security Inc. Microsoft IIS Buffer Overflow Advisory. http://www.eeye.com/html/--Research/Advisories/AD20010618.html, 2001.
[13]
Richard Lippmann, David J. Fried, Isaac Graf, Joshua W. Haines, Kristopher R. Kendall, David McClung, Dan Weber, Seth E. Webster, Dan Wyschogrod, Robert K. Cunningham, and Marc A. Zissman. Evaluating Intrusion Detection systems: 1998 DARPA Off-line Intrusion Detection Evaluation. In Proceedings of IEEE Security Symposium, 1998.
[14]
McAfee. Virus alert. http://vil.nai.com/vil/content/v_9949.htm, 2002.
[15]
David Meyer. University of Oregon Route Views Project. http://antc.uoregon.edu/route--views/, 2002.
[16]
David Moore. Network Telescopes: Observing Small or Distant Security Events. http://www.caida.org/--outreach/presentations/2002/usenix_sec/, 2002.
[17]
David Moore, Goeffrey Voelker, and Stefan Savage. Inferring Internet Denial-of-Service Activity. In Proceedings of the 10th USENIX Security Symposium, 2001.
[18]
Vern Paxson. BRO: A System for Detecting Network Intruders in Real Time. In Proceedings of the 7th USENIX Security Symposium, 1998.
[19]
Marty Roesch. The SNORT Network Intrusion Detection System. http://www.snort.org, 2002.
[20]
Stefan Savage, David Wetherall, Anna Karlin, and Tom Anderson. Practical Network Support for IP Traceback. In Proceedings of ACM SIGCOMM, 2000.
[21]
Alex Snoeren, Craig Partridge, Luis Sanchez, Christine Jones, Fabrice Tchakountio, and Stephen Kent. Hash Based IP Traceback. In Proceedings of ACM SIGCOMM, 2001.
[22]
Stuart Staniford, James Hoagland, and Joseph McAlerney. Practical Automated Detection of Stealthy Portscans. In Journal of Computer Security, 2002.
[23]
Stuart Staniford, Vern Paxson, and Nicholas Weaver. How to Own the Internet in Your Spare Time. In Proceedings of the 11th USENIX Security Symposium, 2002.
[24]
Johannes Ullrich. DSHIELD. http://www.dshield.org, 2000.
[25]
Johannes Ullrich. MSSQL worm (sqlsnake) on the rise. http://www.incidents.org/diary/diary.php?--id = 156, 2002.
[26]
Yin Zhang and Vern Paxson. Detecting Stepping Stones. In Proceedings of the 9th USENIX Security Symposium, 2000.
[27]
G. Zipf. Human Behavior and the Principle of Least-Effort. Addison-Wesley, Cambridge, MA, 1949.

Cited By

View all
  • (2023)DSCOPEProceedings of the 32nd USENIX Conference on Security Symposium10.5555/3620237.3620572(5989-6006)Online publication date: 9-Aug-2023
  • (2021)DDoS-as-a-Smokescreen: Leveraging Netflow Concurrency and Segmentation for Faster Detection2021 Third IEEE International Conference on Trust, Privacy and Security in Intelligent Systems and Applications (TPS-ISA)10.1109/TPSISA52974.2021.00024(217-224)Online publication date: Dec-2021
  • (2021)ApplicationsNetwork Behavior Analysis10.1007/978-981-16-8325-1_7(93-118)Online publication date: 16-Dec-2021
  • Show More Cited By

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image ACM Conferences
SIGMETRICS '03: Proceedings of the 2003 ACM SIGMETRICS international conference on Measurement and modeling of computer systems
June 2003
338 pages
ISBN:1581136641
DOI:10.1145/781027
  • cover image ACM SIGMETRICS Performance Evaluation Review
    ACM SIGMETRICS Performance Evaluation Review  Volume 31, Issue 1
    June 2003
    325 pages
    ISSN:0163-5999
    DOI:10.1145/885651
    Issue’s Table of Contents
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 10 June 2003

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. internet performance and monitoring
  2. network security
  3. wide area measurement

Qualifiers

  • Article

Conference

SIGMETRICS03
Sponsor:

Acceptance Rates

SIGMETRICS '03 Paper Acceptance Rate 26 of 222 submissions, 12%;
Overall Acceptance Rate 459 of 2,691 submissions, 17%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)31
  • Downloads (Last 6 weeks)2
Reflects downloads up to 13 Dec 2024

Other Metrics

Citations

Cited By

View all
  • (2023)DSCOPEProceedings of the 32nd USENIX Conference on Security Symposium10.5555/3620237.3620572(5989-6006)Online publication date: 9-Aug-2023
  • (2021)DDoS-as-a-Smokescreen: Leveraging Netflow Concurrency and Segmentation for Faster Detection2021 Third IEEE International Conference on Trust, Privacy and Security in Intelligent Systems and Applications (TPS-ISA)10.1109/TPSISA52974.2021.00024(217-224)Online publication date: Dec-2021
  • (2021)ApplicationsNetwork Behavior Analysis10.1007/978-981-16-8325-1_7(93-118)Online publication date: 16-Dec-2021
  • (2018)Improving offensive cyber security assessments using varied and novel initialization perspectivesProceedings of the 2018 ACM Southeast Conference10.1145/3190645.3190673(1-9)Online publication date: 29-Mar-2018
  • (2018)Feature Selection for Machine Learning-Based Early Detection of Distributed Cyber Attacks2018 IEEE 16th Intl Conf on Dependable, Autonomic and Secure Computing, 16th Intl Conf on Pervasive Intelligence and Computing, 4th Intl Conf on Big Data Intelligence and Computing and Cyber Science and Technology Congress(DASC/PiCom/DataCom/CyberSciTech)10.1109/DASC/PiCom/DataCom/CyberSciTec.2018.00040(173-180)Online publication date: Aug-2018
  • (2017)Profiling internet scanners: Spatiotemporal structures and measurement ethics2017 Network Traffic Measurement and Analysis Conference (TMA)10.23919/TMA.2017.8002909(1-9)Online publication date: Jun-2017
  • (2017)A Detection System for Distributed DoS Attacks Based on Automatic Extraction of Normal Mode and Its Performance EvaluationSecurity, Privacy, and Anonymity in Computation, Communication, and Storage10.1007/978-3-319-72389-1_37(461-473)Online publication date: 7-Dec-2017
  • (2017)A Behavior-Based Online Engine for Detecting Distributed Cyber-AttacksInformation Security Applications10.1007/978-3-319-56549-1_7(79-89)Online publication date: 30-Mar-2017
  • (2016)Darknet as a Source of Cyber Intelligence: Survey, Taxonomy, and CharacterizationIEEE Communications Surveys & Tutorials10.1109/COMST.2015.249769018:2(1197-1227)Online publication date: Oct-2017
  • (2015)The Dark MenaceProceedings of the 2015 Internet Measurement Conference10.1145/2815675.2815707(169-182)Online publication date: 28-Oct-2015
  • Show More Cited By

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media