1. Deep mining port scans from darknet
- Author
-
NATO [sponsor], Bpifrance [sponsor], Region Grand Est [sponsor], Lagraa, Sofiane, Chen, Yutian, François, Jérôme, NATO [sponsor], Bpifrance [sponsor], Region Grand Est [sponsor], Lagraa, Sofiane, Chen, Yutian, and François, Jérôme
- Abstract
TCP/UDP port scanning or sweeping is one of the most common technique used 3 by attackers to discover accessible and potentially vulnerable hosts and applications. Although extracting and distinguishing different port scanning strategies is a challenging task, the identification of dependencies among probed ports is primordial for profiling attacker behaviors, with a final goal of better mitigating them. In this paper, we propose an approach that allows to track port scanning behavior patterns among multiple probed ports and identify intrinsic properties of observed group of orts. Our method is fully automated based on graph modeling and data mining techniques, including text mining. It provides to security analysts and operators relevant information about services that are jointly targeted by attackers. This is helpful to assess the strategy of the attacker by understanding the types of applications or environment he or she targets. We applied our method to data collected through a large Internet telescope (or darknet).
- Published
- 2019
- Full Text
- View/download PDF