Port Session Communication Analysis Using Density-Based Clustering For Host Anomaly and Risk Activity Analysis

Dandy Pramana Hostiadi, Roy Rudolf Huizen, Lilis Yuningsih, Ni Luh Putri Srinadi, I. Made Darma Susila
{"title":"Port Session Communication Analysis Using Density-Based Clustering For Host Anomaly and Risk Activity Analysis","authors":"Dandy Pramana Hostiadi, Roy Rudolf Huizen, Lilis Yuningsih, Ni Luh Putri Srinadi, I. Made Darma Susila","doi":"10.1109/ICoSTA48221.2020.1570613749","DOIUrl":null,"url":null,"abstract":"Supervision of anomaly activities is very important to do in the network because it could be indicated as malicious activities. Network communication sessions are described in the form of port addressing communication or referred to as port address. In some digital crime events, they are using the port address to do dangerous actions on the network such as DDoS, Probing, R2L, and U2L activities. The grouping model of host activities on the network can utilize clustering theory, namely the neighborhood approach, or refer to as density based. By measuring the proximity of the two activities will be able to group the communication session data distribution from the host and map communication activities based on port access into normal or abnormal activities state. In this research, a new model to analyze port session communication using a density measurement approach to detect anomalous activities was proposed. The result shown that the proposed model can detect a cluster of the status an anomaly, which has more than eighty percent indicates high-risk activity. The proposed model is expected to be able to help network administrators to make decisions or actions from activities that are anomaly and dangerous.","PeriodicalId":375166,"journal":{"name":"2020 International Conference on Smart Technology and Applications (ICoSTA)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2020-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2020 International Conference on Smart Technology and Applications (ICoSTA)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICoSTA48221.2020.1570613749","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

Abstract

Supervision of anomaly activities is very important to do in the network because it could be indicated as malicious activities. Network communication sessions are described in the form of port addressing communication or referred to as port address. In some digital crime events, they are using the port address to do dangerous actions on the network such as DDoS, Probing, R2L, and U2L activities. The grouping model of host activities on the network can utilize clustering theory, namely the neighborhood approach, or refer to as density based. By measuring the proximity of the two activities will be able to group the communication session data distribution from the host and map communication activities based on port access into normal or abnormal activities state. In this research, a new model to analyze port session communication using a density measurement approach to detect anomalous activities was proposed. The result shown that the proposed model can detect a cluster of the status an anomaly, which has more than eighty percent indicates high-risk activity. The proposed model is expected to be able to help network administrators to make decisions or actions from activities that are anomaly and dangerous.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
基于密度聚类的主机异常端口会话通信分析及风险活动分析
在网络中,异常活动的监控是非常重要的,因为它可能被指示为恶意活动。网络通信会话以端口寻址通信的形式描述,或者称为端口地址。在一些数字犯罪事件中,他们利用端口地址在网络上进行DDoS、探测、R2L和U2L活动等危险行为。网络上主机活动的分组模型可以利用聚类理论,即邻域方法,或者称为基于密度的方法。通过测量两个活动的接近度,可以将来自主机的通信会话数据分布分组,并将基于端口访问的通信活动映射为正常或异常活动状态。本研究提出了一种利用密度测量方法检测异常活动的端口会话通信分析新模型。结果表明,所提出的模型能够检测出一簇异常状态,其中80%以上的异常状态为高危活动状态。所建议的模型有望帮助网络管理员从异常和危险的活动中做出决策或采取行动。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
Decentralized Tourism Destinations Rating System Using 6AsTD Framework and Blockchain ICoSTA 2020 Table of Contents IoT Based: Improving Control System For High-Quality Beef in Supermarkets Analysis of Power Transactions on the Integrated Solar Home System A Fuzzy Servqual Method for Evaluated Umrah Service Quality
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1