Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Review Help
Search
A statistical analysis of attack data to separate attacks
Cukier M., Berthier R., Panjwani S., Tan S.  Dependable systems and networks (Proceedings of the International Conference on Dependable Systems and Networks (DSN’06), Jun 25-28, 2006)383-392.2006.Type:Proceedings
Date Reviewed: May 16 2007

When categorizing attacks provides insight on how attacks can be defended against, the work to separate attacks becomes crucial. In this research, a test bed is configured to collect data used in the attacks, such as port scans, Internet control message protocol (ICMP) scans, and vulnerability scans, including a specific type of attack against the server message block (SMB) protocol. (The SMB protocol provides a mechanism for client systems to request file services over a network.) Then, a specific clustering algorithm--the k-means algorithm--is used to separate the collected data from SMB attacks with criteria such as number of bytes, packets, message length, and the duration per attack.

The k-means algorithm has been used in various data mining applications to divide data into clusters. How to collect attack data and the process of analyzing data are the main contributions of the paper. However, as the k-means algorithm provides a sound basis for finding clusters, the application of separating “all” attacks with the k-means algorithm may not be quite appropriate. This may be the reason why this study singles out the attacks against SMB from other attacks when applying the k-means algorithm.

In summary, the title of this paper should really be changed to emphasize that the main goal is to categorize SMB attacks. It is a good reference for empirical studies of attacks.

Reviewer:  Cheer-Sun Yang Review #: CR134275 (0809-0921)
Bookmark and Share
  Reviewer Selected
 
 
Unauthorized Access (K.6.5 ... )
 
 
Security and Protection (C.2.0 ... )
 
 
General (C.2.0 )
 
 
Probability And Statistics (G.3 )
 
Would you recommend this review?
yes
no
Other reviews under "Unauthorized Access": Date
Testing and evaluating computer intrusion detection systems
Durst R., Champion T., Witten B., Miller E., Spagnuolo L. Communications of the ACM 42(7): 53-61, 1999. Type: Article
Aug 1 1999
Honeypots: tracking hackers
Spitzner L., Addison-Wesley Longman Publishing Co., Inc., Boston, MA, 2002. Type: Book (9780321108951)
Jan 2 2003
Web hacking: attacks and defense
McClure S., Shah S., Shah S., Addison-Wesley Longman Publishing Co., Inc., Boston, MA, 2002.  492, Type: Book (9780201761764)
Jul 25 2003
more...

E-Mail This Printer-Friendly
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright 1999-2024 ThinkLoud®
Terms of Use
| Privacy Policy