Analysis of the Impact of Intensive Attacks on the Self-Similarity Degree of the Network Traffic Pedro R. M. In´ acio IT-Networks and Multimedia Group Department of Computer Science University of Beira Interior and Nokia Siemens Networks Portugal S.A. Rua Irm˜ aos Siemens, no. 1 2720-093 Amadora, Portugal pedro.inacio@nsn.com ario M. Freire and Manuela Pereira IT-Networks and Multimedia Group Department of Computer Science University of Beira Interior Rua Marquˆ es de ´ Avila e Bolama 6201-001 Covilh˜ a, Portugal mario@di.ubi.pt Paulo P. Monteiro Institute of Telecommunications University of Aveiro and Nokia Siemens Networks Portugal S.A. Rua Irm˜ aos Siemens, no. 1 2720-093 Amadora, Portugal paulo.1.monteiro@nsn.com Abstract The research on how to use self-similarity for intrusion detection is not unfounded, as the scaling properties seem to partially define the very nature of aggregated traffic, and may become a potential differentiating factor in the pres- ence of an anomaly. This paper explains how network inten- sive attacks can be injected into simulated traces of traffic, to then evolve to their analysis using a fast windowed ver- sion of the Variance Time (VT) estimator, optimized for the purpose of estimating the self-similarity degree in a point- by-point manner. The estimator is also applied to a trace of the well known Massachusetts Institute of Technology / Defense Advanced Research Projects Agency (MIT/DARPA) data set, leading to the conclusion that, during an attack, the insertion of a constant component may induce a signifi- cant increase of the local scope self-similarity degree, which may be used to suspect of the malicious activities and trig- ger further monitoring mechanisms. 1. Introduction Since the developments that unfold the so-called frac- tal nature of network aggregated traffic [9, 6], the con- cept of self-similarity has gathered special interest from the telecommunications research community, being the subject of many contributions along the years [1, 5, 11, 14], where it was observed from many different perspectives. Some focus on how the self-similar traces can be modeled [10], others try to understand how that affects the way traffic is handled along its path to a destination [11], others aim for the development of tools for the estimation of the parame- ters of long-range dependence [5], and others yet describe it as a model for well behaved traffic and propose it to identify anomalies [1, 12]. A tool for intrusion detection inspired in the self-similar properties of the traffic embodies, obviously, a traffic char- acterization mechanism, as it basis its operation on an as- sumption of normality, and aims for enhancing the differ- ences to that normality, possibly introduced by malicious activities. As the statistical properties that a method like this tries to explore, apply to some of the most general as- pects of the traffic, it should be emphasized that it actually strives for categorizing traffic in the dark. Such mechanisms may exhibit many advantages, for they do not need to match a database of signatures with the traffic stream they are ob- serving, nor to look too deeply into the contents of the pack- ets. Despite that, they may suffer from a lack of precision due to the fact that they are not using all the available infor- The Second International Conference on Emerging Security Information, Systems and Technologies 978-0-7695-3329-2/08 $25.00 © 2008 IEEE DOI 10.1109/SECURWARE.2008.28 107 The Second International Conference on Emerging Security Information, Systems and Technologies 978-0-7695-3329-2/08 $25.00 © 2008 IEEE DOI 10.1109/SECURWARE.2008.28 107