EPSRC Reference: |
EP/C532635/1 |
Title: |
Understanding Internet Attacks |
Principal Investigator: |
Parish, Professor D |
Other Investigators: |
|
Researcher Co-Investigators: |
|
Project Partners: |
|
Department: |
Electronic, Electrical & Systems Enginee |
Organisation: |
Loughborough University |
Scheme: |
Standard Research (Pre-FEC) |
Starts: |
15 August 2005 |
Ends: |
14 December 2007 |
Value (£): |
56,845
|
EPSRC Research Topic Classifications: |
Networks & Distributed Systems |
|
|
EPSRC Industrial Sector Classifications: |
Aerospace, Defence and Marine |
Communications |
|
Related Grants: |
|
Panel History: |
|
Summary on Grant Application Form |
There is a pressing need to prevent Internet based crime. This area of criminal activity takes many forms, but is always characterised by its fast changing nature. Cyber criminals and hackers regularly modify attacks and develop new worms. A major requirement in dealing with this type of crime therefore is to have up to date information about these new activities as soon as possible. Network security specialists can then start to prepare or improve protection mechanisms for networks and their host computers. A big problem is how do we find out what the latest attacks look like in network terms? One way of achieving to this is to place special computers in the Internet which can be attacked by the real attackers, but in a controlled manner. These machines would appear to the cyber criminal just like any other computer on the Internet. However, they would be able to capture details of the attacks and record them for further analysis. These special machines would also be limited in the damage which they could do to other parts of the Internet. This approach is taken by the HoneyNet project which is a multi-national initiative to study Internet crime and takes a practical, measurement-based approach to the identification of such activity. The first part of this research activity is to operate and maintain a group of such nodes which have already been set up for this purpose. However, the current systems are rather complex and costly to maintain. This is partly because they generate a significant volume of data all of which by definition is suspect and therefore has to be analysed manually by a computer expert. Much of this data is not very useful for fighting Internet crime. This is because a lot of the traffic which the special computers will capture is generated by known attack tools; it's not from new attacks. The interesting traffic, at least from the perspective of the network security community, would represent new activity, or serious crime attempts. Advanced data processing mechanisms are therefore required to identify the traffic which is potentially interesting and pass only this to the network security analysts for human investigation.The main part of this research proposal therefore is to investigate low cost approaches to Internet abuse monitoring and the data processing which is required to make such systems usable with the minimum amount of human involvement. Data mining techniques, including Case Based Reasoning, Neural Network and signature analysis approaches will be investigated in this part of the work. These processes allow sets of data to be investigated automatically in order to discover trends and characteristics which may identify one section of the data as being different from the rest. As a simple example, consider the presence of spelling mistakes or long gaps in time between messages. Such characteristics could be indicative of a human attacker rather than an automated attack tool. The spelling mistakes may suggest that the attacker is not very experienced. Such information could then help to identify the most promising captured traffic for detailed analysis by a human investigator. Valuable information about new and serious Internet abuse will be generated by the work and this will be made available to the network security community via the international HoneyNet dissemination mechanisms. This information will also be passed to CESG (Communications Electronic Security Group - a Government Agency associated with GCHQ ) who will use it to improve security advice and countermeasures for communication networks.
|
Key Findings |
This information can now be found on Gateway to Research (GtR) http://gtr.rcuk.ac.uk
|
Potential use in non-academic contexts |
This information can now be found on Gateway to Research (GtR) http://gtr.rcuk.ac.uk
|
Impacts |
Description |
This information can now be found on Gateway to Research (GtR) http://gtr.rcuk.ac.uk |
Summary |
|
Date Materialised |
|
|
Sectors submitted by the Researcher |
This information can now be found on Gateway to Research (GtR) http://gtr.rcuk.ac.uk
|
Project URL: |
|
Further Information: |
|
Organisation Website: |
http://www.lboro.ac.uk |