Home > Research > Publications & Outputs > Challenges in Identifying Network Attacks Using...

Electronic data

  • nca2021

    Rights statement: ©2021 IEEE. Personal use of this material is permitted. However, permission to reprint/republish this material for advertising or promotional purposes or for creating new collective works for resale or redistribution to servers or lists, or to reuse any copyrighted component of this work in other works must be obtained from the IEEE.

    Accepted author manuscript, 692 KB, PDF document

    Available under license: CC BY-NC: Creative Commons Attribution-NonCommercial 4.0 International License

Links

Text available via DOI:

View graph of relations

Challenges in Identifying Network Attacks Using Netflow Data

Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

Published

Standard

Challenges in Identifying Network Attacks Using Netflow Data. / Chuah, Edward; Suri, Neeraj; Jhumka, Arshad et al.
2021 IEEE 20th International Symposium on Network Computing and Applications (NCA). IEEE, 2022.

Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

Harvard

Chuah, E, Suri, N, Jhumka, A & Alt, S 2022, Challenges in Identifying Network Attacks Using Netflow Data. in 2021 IEEE 20th International Symposium on Network Computing and Applications (NCA). IEEE. https://doi.org/10.1109/NCA53618.2021.9685305

APA

Chuah, E., Suri, N., Jhumka, A., & Alt, S. (2022). Challenges in Identifying Network Attacks Using Netflow Data. In 2021 IEEE 20th International Symposium on Network Computing and Applications (NCA) IEEE. https://doi.org/10.1109/NCA53618.2021.9685305

Vancouver

Chuah E, Suri N, Jhumka A, Alt S. Challenges in Identifying Network Attacks Using Netflow Data. In 2021 IEEE 20th International Symposium on Network Computing and Applications (NCA). IEEE. 2022 Epub 2021 Nov 23. doi: 10.1109/NCA53618.2021.9685305

Author

Chuah, Edward ; Suri, Neeraj ; Jhumka, Arshad et al. / Challenges in Identifying Network Attacks Using Netflow Data. 2021 IEEE 20th International Symposium on Network Computing and Applications (NCA). IEEE, 2022.

Bibtex

@inproceedings{127b6a32c8bf47b9be6c5eaa5f3c571a,
title = "Challenges in Identifying Network Attacks Using Netflow Data",
abstract = "Large networks often encounter attacks that can affect the network availability. While multiple techniques exist to detect network attacks, a comprehensive understanding of how an attack occurs considering the various layers and components of the network software stack, can be an important element to help improve network security. By performing correlation analysis on contemporary unlabeled Netflow data, this paper conducts a comprehensive study of network flow events to identify communication patterns that may precede an attack, thereby providing potentially useful attack signatures to network administrators. Our work shows that, surprisingly, the Netflow data is not strongly correlated to network attacks. We observe that while spoof requests trigger reflection attacks, only a small percentage of the network packets are associated with the attack. Furthermore, lead time enhancements are feasible for reflection attacks that show long dwell times. Our study on network event correlations highlights empirical observations that could facilitate better attack handling in large networks.",
author = "Edward Chuah and Neeraj Suri and Arshad Jhumka and Samantha Alt",
note = "{\textcopyright}2021 IEEE. Personal use of this material is permitted. However, permission to reprint/republish this material for advertising or promotional purposes or for creating new collective works for resale or redistribution to servers or lists, or to reuse any copyrighted component of this work in other works must be obtained from the IEEE. ",
year = "2022",
month = jan,
day = "31",
doi = "10.1109/NCA53618.2021.9685305",
language = "English",
isbn = "9781665495516",
booktitle = "2021 IEEE 20th International Symposium on Network Computing and Applications (NCA)",
publisher = "IEEE",

}

RIS

TY - GEN

T1 - Challenges in Identifying Network Attacks Using Netflow Data

AU - Chuah, Edward

AU - Suri, Neeraj

AU - Jhumka, Arshad

AU - Alt, Samantha

N1 - ©2021 IEEE. Personal use of this material is permitted. However, permission to reprint/republish this material for advertising or promotional purposes or for creating new collective works for resale or redistribution to servers or lists, or to reuse any copyrighted component of this work in other works must be obtained from the IEEE.

PY - 2022/1/31

Y1 - 2022/1/31

N2 - Large networks often encounter attacks that can affect the network availability. While multiple techniques exist to detect network attacks, a comprehensive understanding of how an attack occurs considering the various layers and components of the network software stack, can be an important element to help improve network security. By performing correlation analysis on contemporary unlabeled Netflow data, this paper conducts a comprehensive study of network flow events to identify communication patterns that may precede an attack, thereby providing potentially useful attack signatures to network administrators. Our work shows that, surprisingly, the Netflow data is not strongly correlated to network attacks. We observe that while spoof requests trigger reflection attacks, only a small percentage of the network packets are associated with the attack. Furthermore, lead time enhancements are feasible for reflection attacks that show long dwell times. Our study on network event correlations highlights empirical observations that could facilitate better attack handling in large networks.

AB - Large networks often encounter attacks that can affect the network availability. While multiple techniques exist to detect network attacks, a comprehensive understanding of how an attack occurs considering the various layers and components of the network software stack, can be an important element to help improve network security. By performing correlation analysis on contemporary unlabeled Netflow data, this paper conducts a comprehensive study of network flow events to identify communication patterns that may precede an attack, thereby providing potentially useful attack signatures to network administrators. Our work shows that, surprisingly, the Netflow data is not strongly correlated to network attacks. We observe that while spoof requests trigger reflection attacks, only a small percentage of the network packets are associated with the attack. Furthermore, lead time enhancements are feasible for reflection attacks that show long dwell times. Our study on network event correlations highlights empirical observations that could facilitate better attack handling in large networks.

UR - https://www.nca-ieee.org/2021/conference_program.html

U2 - 10.1109/NCA53618.2021.9685305

DO - 10.1109/NCA53618.2021.9685305

M3 - Conference contribution/Paper

SN - 9781665495516

BT - 2021 IEEE 20th International Symposium on Network Computing and Applications (NCA)

PB - IEEE

ER -