@conference {18649,
title = {A Statistical Analysis of Attack Data to Separate Attacks},
year = {2006},
month = {2006/06//},
pages = {383 - 392},
abstract = {This paper analyzes malicious activity collected from a test-bed, consisting of two target computers dedicated solely to the purpose of being attacked, over a 109 day time period. We separated port scans, ICMP scans, and vulnerability scans from the malicious activity. In the remaining attack data, over 78\% (i.e., 3,677 attacks) targeted port 445, which was then statistically analyzed. The goal was to find the characteristics that most efficiently separate the attacks. First, we separated the attacks by analyzing their messages. Then we separated the attacks by clustering characteristics using the K-Means algorithm. The comparison between the analysis of the messages and the outcome of the K-Means algorithm showed that 1) the mean of the distributions of packets, bytes and message lengths over time are poor characteristics to separate attacks and 2) the number of bytes, the mean of the distribution of bytes and message lengths as a function of the number packets are the best characteristics for separating attacks},
keywords = {attack data statistical analysis, attack separation, computer crime, Data analysis, data mining, ICMP scans, K-Means algorithm, pattern clustering, port scans, statistical analysis, vulnerability scans},
doi = {10.1109/DSN.2006.9},
author = {Michel Cukier and Berthier,R. and Panjwani,S. and Tan,S.}
}