Detecting and tracing illegal access by using traffic pattern matching technique

Illegal access on the Internet has become a problem in recent years. Since illegal access aimed at the network significantly affects the entire network, there has been an urgent need to establish countermeasures. Observing network traffic is considered an effective means for detecting this type of illegal access. However, problems presented by the kinds of illegal access represented by a DoS (Denial of Service) attack are that the attacker can alter the packet source address. Acquiring and analyzing packet information is also difficult due to the increased network speed. Therefore, there is an urgent need to establish a reliable and low-impact observation technique and a technique that enables attackers to be traced in future high-speed network environments. In this paper, the authors propose an algorithm for detecting illegal access by extracting and comparing changes in traffic patterns and show that illegal access can be detected and traced by applying this algorithm. © 2003 Wiley Periodicals, Inc. Electron Comm Jpn Pt 1, 87(1): 61–71, 2004; Published online in Wiley InterScience (www.interscience.wiley.com). DOI 10.1002/ecja.10014

[1]  Paul Ferguson,et al.  Network Ingress Filtering: Defeating Denial of Service Attacks which employ IP Source Address Spoofing , 1998, RFC.

[2]  Randall J. Atkinson,et al.  Security Architecture for the Internet Protocol , 1995, RFC.

[3]  Steven Waldbusser Remote Network Monitoring Management Information Base , 1991, RFC.

[4]  M. Asaka,et al.  A method of tracing intruders by use of mobile agents , 1999 .

[5]  Shyhtsun Felix Wu,et al.  DECIDUOUS: decentralized source identification for network-based intrusions , 1999, Integrated Network Management VI. Distributed Management for the Networked Millennium. Proceedings of the Sixth IFIP/IEEE International Symposium on Integrated Network Management. (Cat. No.99EX302).

[6]  Marshall T. Rose,et al.  Management Information Base for network management of TCP/IP-based internets , 1990, RFC.

[7]  Nei Kato,et al.  Towards trapping wily intruders in the large , 2000, Recent Advances in Intrusion Detection.