Skip to main content

Collaborative Inter-domain Stealthy Port Scan Detection Using Esper Complex Event Processing

  • Chapter
Book cover Collaborative Financial Infrastructure Protection

Abstract

This chapter describes a specific instance of a Semantic Room that makes use of the well-known centralized complex event processing engine Esper in order to effectively detect inter-domain malicious port scan activities. The Esper engine is deployed by the SR administrator and correlates a massive amount of network traffic data exhibiting the evidence of distributed port scans. The chapter presents two inter-domain SYN scan detection algorithms that have been designed and implemented in Esper and then deployed within the Semantic Room. The two algorithms are the Rank-based SYN (R-SYN) port scan detection algorithm and the Line Fitting port scan detection algorithm. The usefulness of the collaboration employed by the Semantic Room programming model in terms of detection accuracy of the inter-domain port scan attacks is shown. In addition, the chapter shows how Line Fitting is able both to achieve a higher detection accuracy with a smaller number of SR members compared to R-SYN, and to exhibit better detection latencies than R-SYN in the presence of low link bandwidths (i.e., less than 3 Mbit/s) connecting the SR members to the Esper engine deployed by the SR administrator.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 109.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. 2000 DARPA intrusion detection scenario specific data sets. http://www.ll.mit.edu/mission/communications/ist/corpora/ideval/data/2000data.html

  2. ITOC research: CDX datasets. http://www.itoc.usma.edu/research/dataset/index.html

  3. LBNL/ICSI enterprise tracing project. http://www.icir.org/enterprise-tracing/

  4. Where complex event processing meets open source: Esper and NEsper. http://esper.codehaus.org/ (2009)

  5. Bro: an open source Unix based Network intrusion detection system (NIDS). http://www.bro-ids.org/ (2010)

  6. Snort: an open source network intrusion prevention and detection system (IDS/IPS). http://www.snort.org/ (2010)

  7. DShield: cooperative network security community—internet security. http://www.dshield.org/indexd.html/ (2011)

  8. System S. http://domino.research.ibm.com/comm/research_projects.nsf/pages/esps.index.html (2010)

  9. WANem the wide area network emulator. http://wanem.sourceforge.net/ (2011)

  10. Jung, J., Paxson, V., Berger, A.W., Balakrishnan, H.: Fast portscan detection using sequential hypothesis testing. In: Proceedings of the IEEE Symposium on Security and Privacy (2004)

    Google Scholar 

  11. Zhou, C.V., Karunasekera, S., Leckie, C.: Evaluation of a decentralized architecture for large scale collaborative intrusion detection. In: Proc. of the 10th IFIP/IEEE International Symposium on Integrated Network Management (2007)

    Google Scholar 

  12. Akdere, M., Çetintemel, U., Tatbul, N.: Plan-based complex event detection across distributed sources. PVLDB 1(1), 66–77 (2008)

    Google Scholar 

  13. Locasto, M.E., Parekh, J.J., Keromytis, A.D., Stolfo, S.J.: Towards collaborative security and P2P intrusion detection. In: IEEE Workshop on Information Assurance and Security, United States Military Academy, West Point, NY, 15–17 June (2005)

    Google Scholar 

  14. Poncelet, P., Verma, N., Trousset, F., Masseglia, F.: Intrusion detection in collaborative organizations by preserving privacy. In: Advances in Knowledge Discovery and Management, December (2009)

    Google Scholar 

  15. Tang, C., Steinder, M., Spreitzer, M., Pacifici, G.: A scalable application placement controller for enterprise data centers. In: 16th International Conference on World Wide Web (2007)

    Google Scholar 

  16. Xie, Y., Sekar, V., Reiter, M.K., Zhang, H.: Forensic analysis for epidemic attacks in federated networks. In: ICNP, pp. 43–53 (2006)

    Google Scholar 

  17. Zhang, X.J., Andrade, H., Gedik, B., King, R., Morar, J., Nathan, S., Park, Y., Pavuluri, R., Pring, E., Schnier, R., Selo, P., Spicer, M., Uhlig, V., Venkatramani, C.: Implementing a high-volume, low-latency market data processing system on commodity hardware using IBM middleware. In: Proc. of the 2nd ACM Workshop on High Performance Computational Finance, New York, USA, pp. 1–8 (2009)

    Chapter  Google Scholar 

  18. Zhou, C.V., Karunasekera, S., Leckie, C.: A peer-to-peer collaborative intrusion detection system. In: 13th IEEE International Conference on Networks, Kuala Lumpur, Malaysia, November (2005)

    Google Scholar 

  19. Zhou, C.V., Leckie, C., Karunasekera, S.: A survey of coordinated attacks and collaborative intrusion detection. Comput. Secur. 29(2010), 124–140 (2009)

    Google Scholar 

  20. Hauser, C.H., Bakken, D.E., Dionysiou, I., Gjermundrød, K.H., Irava, V.S., Helkey, J., Bose, A.: Security, trust, and QoS in next-generation control and communication for large power systems. Int. J. Comput. Inf. Sci. 4(1/2), 3–16 (2008)

    Google Scholar 

  21. Huang, Y., Feamster, N., Lakhina, A., Xu, J.(Jun): Diagnosing network disruptions with network-wide analysis. In: Proc. of the 2007 ACM SIGMETRICS International Conference on Measurement and Modeling of Computer Systems, pp. 61–72. ACM, New York (2007)

    Chapter  Google Scholar 

  22. Aniello, L., Lodi, G., Baldoni, R.: Inter-domain stealthy port scan detection through complex event processing. In: Proc. of 13th European Workshop on Dependable Computing, Pisa, 11–12 May (2011)

    Google Scholar 

  23. Aniello, L., Lodi, G., Di Luna, G.A., Baldoni, R.: A collaborative event processing system for protection of critical infrastructures from cyber attacks. In: Proceedings of the 30th Conference on System Safety, Reliability and Security (SAFECOMP), Napoli, September (2011)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Giorgia Lodi .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2012 Springer-Verlag Berlin Heidelberg

About this chapter

Cite this chapter

Esteves Verssimo, P., Aniello, L., Di Luna, G.A., Lodi, G., Baldoni, R. (2012). Collaborative Inter-domain Stealthy Port Scan Detection Using Esper Complex Event Processing. In: Baldoni, R., Chockler, G. (eds) Collaborative Financial Infrastructure Protection. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-20420-3_7

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-20420-3_7

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-20419-7

  • Online ISBN: 978-3-642-20420-3

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics