Show simple item record

dc.creatorLin, Sheng-Ya
dc.date.accessioned2013-10-02T21:28:43Z
dc.date.available2015-05-01T05:57:08Z
dc.date.created2013-05
dc.date.issued2013-02-12
dc.date.submittedMay 2013
dc.identifier.urihttps://hdl.handle.net/1969.1/149307
dc.description.abstractThis dissertation investigates modeling techniques and computing algorithms for detection of anomalous contents and traffic flows of ingress Internet traffic at an enterprise network gateway. Anomalous contents refer to a large volume of ingress packets whose contents are not wanted by enterprise users, such as unsolicited electronic messages (UNE). UNE are often sent by Botnet farms for network resource exploitation, information stealing, and they incur high costs in bandwidth waste. Many products have been designed to block UNE, but most of them rely on signature database(s) for matching, and they cannot recognize unknown attacks. To address this limitation, in this dissertation I propose a Progressive E-Message Classifier (PEC) to timely classify message patterns that are commonly associated with UNE. On the basis of a scoring and aging engine, a real-time scoreboard keeps track of detected feature instances of the detection features until they are considered either as UNE or normal messages. A mathematical model has been designed to precisely depict system behaviors and then set detection parameters. The PEC performance is widely studied using different parameters based on several experiments. The objective of anomalous traffic flow detection is to detect selfish Transmission Control Protocol, TCP, flows which do not conform to one of the handful of congestion control protocols in adjusting their packet transmission rates in the face of network congestion. Given that none of the operational parameters in congestion control are carried in the transmitted packets, a gateway can only use packet arrival times to recover states of end to end congestion control rules, if any. We develop new techniques to estimate round trip time (RTT) using EWMA Lomb-Scargle periodogram, detect change of congestion windows by the CUSUM algorithm, and then finally predict detected congestion flow states using a prioritized decision chain. A high level finite state machine (FSM) takes the predictions as inputs to determine if a TCP flow follows a particular congestion control protocol. Multiple experiments show promising outcomes of classifying flows of different protocols based on the ratio of the aberrant transition count to normal transition count generated by FSM.en
dc.format.mimetypeapplication/pdf
dc.language.isoen
dc.subjectNetwork Anomaly Detectionen
dc.subjectEnterprise network gatewayen
dc.titleModeling and Detection of Content and Packet Flow Anomalies at Enterprise Network Gatewayen
dc.typeThesisen
thesis.degree.departmentComputer Science and Engineeringen
thesis.degree.disciplineComputer Engineeringen
thesis.degree.grantorTexas A&M Universityen
thesis.degree.nameDoctor of Philosophyen
thesis.degree.levelDoctoralen
dc.contributor.committeeMemberLiu , Jyh-Charn
dc.contributor.committeeMemberMahapatra, Rabi
dc.contributor.committeeMemberSong, Dezhen
dc.contributor.committeeMemberDing, Yu
dc.type.materialtexten
dc.date.updated2013-10-02T21:28:43Z
local.embargo.terms2015-05-01


Files in this item

Thumbnail
Thumbnail

This item appears in the following Collection(s)

Show simple item record