An Effective Payload Attribution Scheme for Cybercriminal Detection Using Compressed Bitmap Index Tables and Traffic Downsampling

06/12/2019
by   S. Mohammad Hosseini, et al.
0

Payload attribution systems (PAS) are one of the most important tools of network forensics for detecting an offender after the occurrence of a cybercrime. A PAS stores the network traffic history in order to detect the source and destination pair of a certain data stream in case a malicious activity occurs on the network. The huge volume of information that is daily transferred in the network means that the data stored by a PAS must be as compact and concise as possible. Moreover, the investigation of this large volume of data for a malicious data stream must be handled within a reasonable time. For this purpose, several techniques based on storing a digest of traffic using Bloom filters have been proposed in the literature. The false positive rate of existing techniques for detecting cybercriminals is unacceptably high, i.e., many source and destination pairs are falsely determined as malicious, making it difficult to detect the true criminal. In order to ameliorate this problem, we have proposed a solution based on compressed bitmap index tables and traffic downsampling. Our analytical evaluation and experimental results show that the proposed method significantly reduces the false positive rate.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
10/04/2019

Digesting Network Traffic for Forensic Investigation Using Digital Signal Processing Techniques

One of the most important practices of cybercrime investigations is to s...
research
08/05/2020

MORTON: Detection of Malicious Routines in Large-Scale DNS Traffic

In this paper, we present MORTON, a system that identifies compromised e...
research
01/08/2018

How to find a GSMem malicious activity via an AI approach

This paper investigates the following problem: how to find a GSMem malic...
research
08/26/2022

Automated False Positive Filtering for esNetwork Alerts

An Intrusion Detection System (IDS) is one of the security tools that ca...
research
04/09/2019

Malicious Overtones: hunting data theft in the frequency domain with one-class learning

A method for detecting electronic data theft from computer networks is d...
research
09/04/2021

Stretching Your Data With Taffy Filters

Popular approximate membership query structures such as Bloom filters an...
research
06/18/2020

CoinPolice:Detecting Hidden Cryptojacking Attacks with Neural Networks

Traffic monetization is a crucial component of running most for-profit o...

Please sign up or login with your details

Forgot password? Click here to reset