Understanding Traffic Patterns of Covid-19 IoC in Huge Academic Backbone Network SINET

R. Ando, Y. Kadobayashi, H. Takakura, Hiroshi Itoh
{"title":"Understanding Traffic Patterns of Covid-19 IoC in Huge Academic Backbone Network SINET","authors":"R. Ando, Y. Kadobayashi, H. Takakura, Hiroshi Itoh","doi":"10.5121/ijnsa.2021.13603","DOIUrl":null,"url":null,"abstract":"Recently, APT (Advanced Persistent Threats) groups are using the COVID-19 pandemic as part of their cyber operations. In response to cyber threat actors, IoCs (Indicators of Compromise) are being provided to help us take some countermeasures. In this paper, we analyse how the coronavirus-based cyber attack unfolded on the academic infrastructure network SINET (The Science Information Network) based on the passive measurement with IoC. SINET is Japan's academic information infrastructure network. To extract and analyze the traffic patterns of the COVID-19 attacker group, we implemented a data flow pipeline for handling huge session traffic data observed on SINET. The data flow pipeline provides three functions: (1) identification the direction of the traffic, (2) filtering the port numbers, and (3) generation of the time series data. From the output of our pipeline, it is clear that the attacker's traffic can be broken down into several patterns. To name a few, we have witnessed (1) huge burstiness (port 25: FTP and high port applications), (3) diurnal patterns (port 443: SSL), and (3) periodic patterns with low amplitude (port 25: SMTP) We can conclude that some unveiled patterns by our pipeline are informative to handling security operations of the academic backbone network. Particularly, we have found burstiness of high port and unknown applications with the number of session data ranging from 10,000 to 35,000. For understanding the traffic patterns on SINET, our data flow pipeline can utilize any IoC based on the list of IP address for traffic ingress/egress identification and port filtering.","PeriodicalId":93303,"journal":{"name":"International journal of network security & its applications","volume":"6 1","pages":""},"PeriodicalIF":0.0000,"publicationDate":"2021-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"International journal of network security & its applications","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.5121/ijnsa.2021.13603","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

Abstract

Recently, APT (Advanced Persistent Threats) groups are using the COVID-19 pandemic as part of their cyber operations. In response to cyber threat actors, IoCs (Indicators of Compromise) are being provided to help us take some countermeasures. In this paper, we analyse how the coronavirus-based cyber attack unfolded on the academic infrastructure network SINET (The Science Information Network) based on the passive measurement with IoC. SINET is Japan's academic information infrastructure network. To extract and analyze the traffic patterns of the COVID-19 attacker group, we implemented a data flow pipeline for handling huge session traffic data observed on SINET. The data flow pipeline provides three functions: (1) identification the direction of the traffic, (2) filtering the port numbers, and (3) generation of the time series data. From the output of our pipeline, it is clear that the attacker's traffic can be broken down into several patterns. To name a few, we have witnessed (1) huge burstiness (port 25: FTP and high port applications), (3) diurnal patterns (port 443: SSL), and (3) periodic patterns with low amplitude (port 25: SMTP) We can conclude that some unveiled patterns by our pipeline are informative to handling security operations of the academic backbone network. Particularly, we have found burstiness of high port and unknown applications with the number of session data ranging from 10,000 to 35,000. For understanding the traffic patterns on SINET, our data flow pipeline can utilize any IoC based on the list of IP address for traffic ingress/egress identification and port filtering.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
了解新型冠状病毒IoC在大型学术骨干网SINET中的流量模式
最近,APT(高级持续威胁)组织正在利用COVID-19大流行作为其网络运营的一部分。为了应对网络威胁行为者,我们提供了ioc(妥协指标)来帮助我们采取一些对策。本文基于IoC被动测量,分析了基于冠状病毒的网络攻击是如何在学术基础网络SINET(科学信息网络)上展开的。SINET是日本的学术信息基础设施网络。为了提取和分析COVID-19攻击组的流量模式,我们实现了一个数据流管道,用于处理在SINET上观察到的大量会话流量数据。数据流管道提供三个功能:(1)识别流量方向;(2)过滤端口号;(3)生成时间序列数据。从我们管道的输出可以清楚地看出,攻击者的流量可以被分解成几个模式。举几个例子,我们见证了(1)巨大的突发(端口25:FTP和高端口应用程序),(3)每日模式(端口443:SSL)和(3)低振幅的周期性模式(端口25:SMTP)。我们可以得出结论,我们的管道揭示的一些模式对处理学术骨干网络的安全操作有帮助。特别是,我们发现高端口和未知应用程序的会话数据数量从10,000到35,000不等。为了理解SINET上的流量模式,我们的数据流管道可以利用基于IP地址列表的任何IoC来进行流量的入口/出口识别和端口过滤。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
Invertible Neural Network for Inference Pipeline Anomaly Detection SPDZ-Based Optimistic Fair Multi-Party Computation Detection Exploring the Effectiveness of VPN Architecture in Enhancing Network Security for Mobile Networks: An Investigation Study A NOVEL ALERT CORRELATION TECHNIQUE FOR FILTERING NETWORK ATTACKS Offline Signature Recognition via Convolutional Neural Network and Multiple Classifiers
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1