Behavioral analysis of network flow traffic

dc.contributor.authorHeller, Mark D.
dc.contributor.corporateNaval Postgraduate School (U.S.)
dc.contributor.departmentInformation Warfare Systems Engineering
dc.contributor.departmentComputer Science (CS)
dc.contributor.secondreaderXie, Geoffrey G.
dc.contributor.secondreaderGibson, John
dc.contributor.secondreaderCollins, Michael
dc.contributor.secondreaderBuettner, Raymond
dc.date.accessioned2012-03-14T17:44:12Z
dc.date.available2012-03-14T17:44:12Z
dc.date.issued2010-09
dc.description.abstractNetwork Behavior Analysis (NBA) is a technique to enhance network security by passively monitoring aggregate traffic patterns and noting unusual action or departures from normal operations. The analysis is typically performed offline, due to the huge volume of input data, in contrast to conventional intrusion prevention solutions based on deep packet inspection, signature detection, and real-time blocking. After establishing a benchmark for normal traffic, an NBA program monitors network activity and flags unknown, new, or unusual patterns that might indicate the presence of a potential threat. NBA also monitors and records trends in bandwidth and protocol use. Computer users in the Department of Defense (DoD) operational networks may use Hypertext Transport Protocol (HTTP) to stream video from multimedia sites like youtube.com, myspace.com, mtv.com, and blackplanet.com. Such streaming may hog bandwidth, a grave concern, given that increasing amounts of operational data are exchanged over the Global Information Grid, and introduce malicious viruses inadvertently. This thesis develops an NBA solution to identify and estimate the bandwidth usage of HTTP streaming video traffic entirely from flow records such as Cisco's NetFlow data.en_US
dc.description.distributionstatementApproved for public release; distribution is unlimited.
dc.description.serviceUS Navy (USN) authoren_US
dc.description.urihttp://archive.org/details/behavioralnalysi109455108
dc.format.extentxvi, 77 p. ;en_US
dc.identifier.oclc689051535
dc.identifier.urihttps://hdl.handle.net/10945/5108
dc.publisherMonterey, California. Naval Postgraduate Schoolen_US
dc.rightsThis publication is a work of the U.S. Government as defined in Title 17, United States Code, Section 101. Copyright protection is not available for this work in the United States.en_US
dc.subject.lcshComputer scienceen_US
dc.subject.lcshBehavioral assessmenten_US
dc.titleBehavioral analysis of network flow trafficen_US
dc.typeThesisen_US
dspace.entity.typePublication
etd.thesisdegree.disciplineComputer Science and M.S. in Information Warfare Systems Engineeringen_US
etd.thesisdegree.grantorNaval Postgraduate Schoolen_US
etd.thesisdegree.levelMastersen_US
etd.thesisdegree.nameM.S.en_US
etd.verifiednoen_US
Files
Original bundle
Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
10Sep_Luckie.pdf
Size:
1.81 MB
Format:
Adobe Portable Document Format
Collections