Denial-of-Service Attack Detection Based on Multivariate Correlation Analysis

被引:0
|
作者
Tan, Zhiyuan [1 ]
Jamdagni, Aruna [1 ,2 ]
He, Xiangjian [1 ]
Nanda, Priyadarsi [1 ]
Liu, Ren Ping
机构
[1] Univ Technol Sydney, Ctr Innovat IT Serv & Applicat iNEXT, Sydney, NSW 2007, Australia
[2] CSIRO Marsfield, Marsfield, NSW, Australia
来源
关键词
Denial-of-Service Attack; Euclidean Distance Map; Multivariate Correlations; Anomaly Detection; ANOMALY DETECTION; INTRUSION DETECTION; NETWORK INTRUSION;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
The reliability and availability of network services are being threatened by the growing number of Denial-of-Service (DoS) attacks. Effective mechanisms for DoS attack detection are demanded. Therefore, we propose a multivariate correlation analysis approach to investigate and extract second-order statistics from the observed network traffic records. These second-order statistics extracted by the proposed analysis approach can provide important correlative information hiding among the features. By making use of this hidden information, the detection accuracy can be significantly enhanced. The effectiveness of the proposed multivariate correlation analysis approach is evaluated on the KDD CUP 99 dataset. The evaluation shows encouraging results with average 99.96% detection rate and 2.08% false positive rate. Comparisons also show that our multivariate correlation analysis based detection approach outperforms some other current researches in detecting DoS attacks.
引用
收藏
页码:756 / +
页数:3
相关论文
共 50 条
  • [1] A System for Denial-of-Service Attack Detection Based on Multivariate Correlation Analysis
    Tan, Zhiyuan
    Jamdagni, Aruna
    He, Xiangjian
    Nanda, Priyadarsi
    Liu, Ren Ping
    [J]. IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2014, 25 (02) : 447 - 456
  • [2] A SURVEY ON EFFECTIVE WAY OF DETECTING DENIAL-OF-SERVICE ATTACK USING MULTIVARIATE CORRELATION ANALYSIS
    More, Komal K.
    Gosavi, Pramod B.
    [J]. PROCEEDINGS OF THE 2015 INTERNATIONAL CONFERENCE ON APPLIED AND THEORETICAL COMPUTING AND COMMUNICATION TECHNOLOGY (ICATCCT), 2015, : 246 - 250
  • [3] Denial-of-Service Attack Detection System
    Thakare, Supriya S.
    Kaur, Parminder
    [J]. 2017 1ST INTERNATIONAL CONFERENCE ON INTELLIGENT SYSTEMS AND INFORMATION MANAGEMENT (ICISIM), 2017, : 281 - 285
  • [4] A Real Time System for Denial of service Attack Detection Based on Multivariate Correlation Analysis Approach
    More, Komal K.
    Gosavi, Pramod B.
    [J]. 2016 INTERNATIONAL CONFERENCE ON ELECTRICAL, ELECTRONICS, AND OPTIMIZATION TECHNIQUES (ICEEOT), 2016, : 1125 - 1131
  • [5] Denial-of-service attack-detection techniques
    Carl, G
    Kesidis, G
    Brooks, RR
    Rai, S
    [J]. IEEE INTERNET COMPUTING, 2006, 10 (01) : 82 - 89
  • [6] Denial-of-Service Attack Detection Using Anomaly with Misuse Based Method
    Suganya, R.
    [J]. INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2016, 16 (04): : 124 - 128
  • [7] Wavelet based denial-of-service detection
    Carl, Glenn
    Brooks, Richard R.
    Rai, Suresh
    [J]. COMPUTERS & SECURITY, 2006, 25 (08) : 600 - 615
  • [8] Entropy-based denial-of-service attack detection in cloud data center
    Cao, Jiuxin
    Yu, Bin
    Dong, Fang
    Zhu, Xiangying
    Xu, Shuai
    [J]. CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2015, 27 (18): : 5623 - 5639
  • [9] Refined LSTM Based Intrusion Detection for Denial-of-Service Attack in Internet of Things
    Alimi, Kuburat Oyeranti Adefemi
    Ouahada, Khmaies
    Abu-Mahfouz, Adnan M.
    Rimer, Suvendi
    Alimi, Oyeniyi Akeem
    [J]. JOURNAL OF SENSOR AND ACTUATOR NETWORKS, 2022, 11 (03)
  • [10] A detection scheme against Distributed Reflector Denial-of-Service attack
    Kim, YS
    Jeon, JC
    Jeon, JW
    Yoo, KY
    [J]. 8TH WORLD MULTI-CONFERENCE ON SYSTEMICS, CYBERNETICS AND INFORMATICS, VOL IX, PROCEEDINGS: COMPUTER SCIENCE AND ENGINEERING: I, 2004, : 44 - 48