Network traffic behaviour profiling

<p>Nowadays, computer networks have become incredibly complex due to the evolution of online services and the rapid growth of the number of smart devices such as smartphones, tablets and laptops. Most of users’ information, even the most sensitive ones, are transmitted over the Internet. Unfo...

Volledige beschrijving

Bibliografische gegevens
Hoofdauteur: Piskozub, M
Andere auteurs: Martinovic, I
Formaat: Thesis
Taal:English
Gepubliceerd in: 2020
Onderwerpen:
_version_ 1826304931471032320
author Piskozub, M
author2 Martinovic, I
author_facet Martinovic, I
Piskozub, M
author_sort Piskozub, M
collection OXFORD
description <p>Nowadays, computer networks have become incredibly complex due to the evolution of online services and the rapid growth of the number of smart devices such as smartphones, tablets and laptops. Most of users’ information, even the most sensitive ones, are transmitted over the Internet. Unfortunately, due to this phenomenon we also see an increasing interest of malware developers who are able to find and exploit novel vulnerabilities in network devices to carry out their malicious intents. To tackle these threats, network analysts should be aided with advanced techniques to identify malicious traffic in order to guarantee the security of networks.</p> <p>In this thesis, we aim to reduce the asymmetric advantage of attackers by examining malware detection and classification using flow-level network traffic. Our methods explore the ability to extract network behaviours generated by malware. We further evaluate the challenge of working with limited amount of data offered by flows to detect and classify network traffic of malware. Malicious flows are intertwined with benign ones originating from a production network to simulate the real-world settings. We gather one of the largest network flow datasets of malware in order to evaluate our proposals and show that we can detect unseen malware variants.</p> <p>Moreover, we explore the behaviour profiling of network hosts in order to identify them on large networks. We extract unique behaviours and show that we can work only with the amount of information exchanged by hosts in order to successfully extract their unique behaviours and hence distinguish them from others. We show that while such an approach could be used for maintenance of networks, it may also be employed as an attack against network-based moving target defence (NMTD) systems, which is followed by countermeasures and guidelines to avoid such scenarios. </p> <p>Finally, we propose a novel method of storing network flow data in a domain specific binary file format, which is motivated by the lack of sufficient methods to process large-scale network data on the order of billions of flows. The binary format makes the analyses of methods in this thesis possible, especially when working with the University of Oxford dataset, which contains more than 181 billion flows. We show that our binary format improves the state of the art in terms of storage, while offering faster data processing techniques.</p>
first_indexed 2024-03-07T06:25:12Z
format Thesis
id oxford-uuid:f40bf0ff-9adb-4d4f-9f87-2bd69eaf6be4
institution University of Oxford
language English
last_indexed 2024-03-07T06:25:12Z
publishDate 2020
record_format dspace
spelling oxford-uuid:f40bf0ff-9adb-4d4f-9f87-2bd69eaf6be42022-03-27T12:16:48ZNetwork traffic behaviour profilingThesishttp://purl.org/coar/resource_type/c_db06uuid:f40bf0ff-9adb-4d4f-9f87-2bd69eaf6be4Cyber SecurityComputer ScienceEnglishHyrax Deposit2020Piskozub, MMartinovic, I <p>Nowadays, computer networks have become incredibly complex due to the evolution of online services and the rapid growth of the number of smart devices such as smartphones, tablets and laptops. Most of users’ information, even the most sensitive ones, are transmitted over the Internet. Unfortunately, due to this phenomenon we also see an increasing interest of malware developers who are able to find and exploit novel vulnerabilities in network devices to carry out their malicious intents. To tackle these threats, network analysts should be aided with advanced techniques to identify malicious traffic in order to guarantee the security of networks.</p> <p>In this thesis, we aim to reduce the asymmetric advantage of attackers by examining malware detection and classification using flow-level network traffic. Our methods explore the ability to extract network behaviours generated by malware. We further evaluate the challenge of working with limited amount of data offered by flows to detect and classify network traffic of malware. Malicious flows are intertwined with benign ones originating from a production network to simulate the real-world settings. We gather one of the largest network flow datasets of malware in order to evaluate our proposals and show that we can detect unseen malware variants.</p> <p>Moreover, we explore the behaviour profiling of network hosts in order to identify them on large networks. We extract unique behaviours and show that we can work only with the amount of information exchanged by hosts in order to successfully extract their unique behaviours and hence distinguish them from others. We show that while such an approach could be used for maintenance of networks, it may also be employed as an attack against network-based moving target defence (NMTD) systems, which is followed by countermeasures and guidelines to avoid such scenarios. </p> <p>Finally, we propose a novel method of storing network flow data in a domain specific binary file format, which is motivated by the lack of sufficient methods to process large-scale network data on the order of billions of flows. The binary format makes the analyses of methods in this thesis possible, especially when working with the University of Oxford dataset, which contains more than 181 billion flows. We show that our binary format improves the state of the art in terms of storage, while offering faster data processing techniques.</p>
spellingShingle Cyber Security
Computer Science
Piskozub, M
Network traffic behaviour profiling
title Network traffic behaviour profiling
title_full Network traffic behaviour profiling
title_fullStr Network traffic behaviour profiling
title_full_unstemmed Network traffic behaviour profiling
title_short Network traffic behaviour profiling
title_sort network traffic behaviour profiling
topic Cyber Security
Computer Science
work_keys_str_mv AT piskozubm networktrafficbehaviourprofiling