Detecting target data in network traffic
dc.contributor.advisor | McCarrin, Michael | |
dc.contributor.advisor | Robert, Beverly | |
dc.contributor.author | Haycraft, Aaron | |
dc.date | Mar-17 | |
dc.date.accessioned | 2017-05-10T16:31:37Z | |
dc.date.available | 2017-05-10T16:31:37Z | |
dc.date.issued | 2017-03 | |
dc.identifier.uri | https://hdl.handle.net/10945/52989 | |
dc.description.abstract | Data exfiltration over a network poses a threat to confidential information. Due to the possibility of malicious insiders, this threat is especially difficult to mitigate. Our goal is to contribute to the development of a method to detect exfiltration of many targeted files without incurring the full cost of reassembling flows. One strategy for accomplishing this would be to implement an approximate matching scheme that attempts to determine whether a file is being transmitted over the network by analyzing the quantity of payload data that matches fragments of the targeted file. Ourwork establishes the basic feasibility of such an approach by matching Transmission Control Protocol (TCP) payloads of traffic containing exfiltrated data against a database of MD5 hashes, each representing a fragment of our target data. We tested against a database of 415 million fragment hashes, where the length of the fragments was chosen to be smaller than the payload size expected for most common Maximum Transmission Units (MTUs), and we simulated exfiltration by sending a sample of our targeted data across the network along with other non-target files representing noise. We demonstrate that under these conditions, we are able to detect the targeted content with a recall of 98.3% and precision of 99.1%. | en_US |
dc.description.uri | http://archive.org/details/detectingtargetd1094552989 | |
dc.publisher | Monterey, California: Naval Postgraduate School | en_US |
dc.rights | Copyright is reserved by the copyright owner. | en_US |
dc.title | Detecting target data in network traffic | en_US |
dc.type | Thesis | en_US |
dc.contributor.department | Computer Science (CS) | |
dc.subject.author | exfiltration | en_US |
dc.subject.author | information | en_US |
dc.subject.author | flows | en_US |
dc.subject.author | hashes | en_US |
dc.description.service | Civilian, Federal Reserve Bank of San Francisco | en_US |
etd.thesisdegree.name | Master of Science in Computer Science | en_US |
etd.thesisdegree.level | Masters | en_US |
etd.thesisdegree.discipline | Computer Science | en_US |
etd.thesisdegree.grantor | Naval Postgraduate School | en_US |
dc.description.distributionstatement | Approved for public release; distribution is unlimited. |
Files in this item
This item appears in the following Collection(s)
-
1. Thesis and Dissertation Collection, all items
Publicly releasable NPS Theses, Dissertations, MBA Professional Reports, Joint Applied Projects, Systems Engineering Project Reports and other NPS degree-earning written works.