Malicious Events Grouping via Behavior Based Darknet Traffic Flow Analysis

Published: 01 Jan 2017, Last Modified: 07 May 2025Wirel. Pers. Commun. 2017EveryoneRevisionsBibTeXCC BY-SA 4.0
Abstract: This paper proposes a host behavior based darknet traffic decomposition approach to identifying groups of malicious events from massive historical darknet traffic. In this approach, we segment traffic flows from captured darknet data, distinguish scan from non-scan flows, and categorize scans according to scan width spreads. Consequently, event groups are appraised by applying the criterion that malicious events generated by the same attacker or malicious software should have similar average packet delay, AvgDly. We have applied the proposed approach to 12 months darknet traffic data for malicious events grouping. As a result, several large scale event groups are discovered on host behavior in the category of port scan, IP scan and hybrid scan, respectively.
Loading