Network traffic anomalies automatic detection in DDoS attacks

被引:0
|
作者
Orekhov, Andrey V. [1 ]
Orekhov, Aleksey A. [2 ]
机构
[1] St Petersburg State Univ, 7-9 Univ Skaya Nab, St Petersburg 199034, Russia
[2] Transtech, 1 Pl Konstitutsii, St Petersburg 196247, Russia
关键词
traffic strategy; DDoS attack; unsupervised machine learning; sequential statistical analysis; Markov moment; least squares method;
D O I
10.21638/11701/spbu10.2023.210
中图分类号
O1 [数学];
学科分类号
0701 ; 070101 ;
摘要
Distributed denial-of-service attacks (DDoS attacks) are intrusions into computing systems of the Internet. Their purpose is to make systems of the Internet inaccessible for users. DDoS attack consist of sending many requests to a certain resource at the same time. As a result, the server cannot withstand the network load. In such situation, a provider must determine the moment when attack begins and change the traffic management strategy. Detection of the beginning of a DDoS attack is possible by using unsupervised machine learning methods and sequential statistical analysis of network activity. To activate that, convenient to use mathematical models based on discrete random processes with monotonically increasing trajectories. Random functions, which are represented in the correspondence between generalized time and the cumulative sum of network traffic or the correspondence between the total number of incoming packets and the cumulative sum of packets processed, change their type of increasing from linear to non-linear. In the first case, to parabolic or exponential, in the second case to logarithmic or arctangent. To determine the moment when the type of increasing is going to change, one can use quadratic forms of approximation-estimation tests as statistical rules.
引用
收藏
页码:251 / 263
页数:13
相关论文
共 50 条
  • [1] A comprehensive survey of network traffic anomalies and DDoS attacks detection schemes using fuzzy techniques
    Lin, Haiping
    Wu, Chengwen
    Masdari, Mohammad
    [J]. COMPUTERS & ELECTRICAL ENGINEERING, 2022, 104
  • [2] Detection of DDoS attacks using optimized traffic matrix
    Lee, Sang Min
    Kim, Dong Seong
    Lee, Je Hak
    Park, Jong Sou
    [J]. COMPUTERS & MATHEMATICS WITH APPLICATIONS, 2012, 63 (02) : 501 - 510
  • [3] Weighted Fuzzy Clustering for Online Detection of Application DDoS Attacks in Encrypted Network Traffic
    Zolotukhin, Mikhail
    Kokkonen, Tero
    Hamalainen, Timo
    Siltanen, Jarmo
    [J]. INTERNET OF THINGS, SMART SPACES, AND NEXT GENERATION NETWORKS AND SYSTEMS, NEW2AN 2016/USMART 2016, 2016, 9870 : 326 - 338
  • [4] Automatic Detection of Computer Network Traffic Anomalies based on Eccentricity Analysis
    Martins, Rodrigo Siqueira
    Angelov, Plamen
    Jales Costa, Bruno Sielly
    [J]. 2018 IEEE INTERNATIONAL CONFERENCE ON FUZZY SYSTEMS (FUZZ-IEEE), 2018,
  • [5] Detecting DDoS attacks by analyzing the dynamics and interrelation of network traffic characteristics
    Krasnov, A. E.
    Nadezhdin, E. N.
    Nikol'skii, D. N.
    Repin, D. S.
    Galyaev, V. S.
    [J]. VESTNIK UDMURTSKOGO UNIVERSITETA-MATEMATIKA MEKHANIKA KOMPYUTERNYE NAUKI, 2018, 28 (03): : 407 - 418
  • [6] Detecting DDoS Attacks Using the Analysis of Network Traffic as Dynamical System
    Krasnov, A. E.
    Nikol'skii, D. N.
    Repin, D. S.
    Galyaev, V. S.
    Zykova, E. A.
    [J]. 2018 INTERNATIONAL SCIENTIFIC AND TECHNICAL CONFERENCE MODERN COMPUTER NETWORK TECHNOLOGIES (MONETEC 2018), 2018,
  • [7] Convolutional Neural Network-Based Automatic Diagnostic System for AL-DDoS Attacks Detection
    Abdullayeva, Fargana J.
    [J]. INTERNATIONAL JOURNAL OF CYBER WARFARE AND TERRORISM, 2022, 12 (01) : 1 - 15
  • [8] Effect of DDoS Attacks on Traffic Features
    Erhan, Derya
    Anarim, Emin
    Kurt, Gunes Karabulut
    Kosar, Rabun
    [J]. 2013 21ST SIGNAL PROCESSING AND COMMUNICATIONS APPLICATIONS CONFERENCE (SIU), 2013,
  • [9] Collaborative detection of DDoS attacks over multiple network domains
    Chen, Yu
    Hwang, Kai
    Ku, Wei-Shinn
    [J]. IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2007, 18 (12) : 1649 - 1662
  • [10] Network Parameters Applicable in Detection of Infrastructure Level DDoS Attacks
    Cvitic, Ivan
    Perakovic, Dragan
    Perisa, Marko
    Musa, Mario
    [J]. 2017 25TH TELECOMMUNICATION FORUM (TELFOR), 2017, : 310 - 313