Denial-of-Service Attack Detection Based on Multivariate Correlation Analysis

被引:0
|
作者
Tan, Zhiyuan [1 ]
Jamdagni, Aruna [1 ,2 ]
He, Xiangjian [1 ]
Nanda, Priyadarsi [1 ]
Liu, Ren Ping
机构
[1] Univ Technol Sydney, Ctr Innovat IT Serv & Applicat iNEXT, Sydney, NSW 2007, Australia
[2] CSIRO Marsfield, Marsfield, NSW, Australia
来源
关键词
Denial-of-Service Attack; Euclidean Distance Map; Multivariate Correlations; Anomaly Detection; ANOMALY DETECTION; INTRUSION DETECTION; NETWORK INTRUSION;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
The reliability and availability of network services are being threatened by the growing number of Denial-of-Service (DoS) attacks. Effective mechanisms for DoS attack detection are demanded. Therefore, we propose a multivariate correlation analysis approach to investigate and extract second-order statistics from the observed network traffic records. These second-order statistics extracted by the proposed analysis approach can provide important correlative information hiding among the features. By making use of this hidden information, the detection accuracy can be significantly enhanced. The effectiveness of the proposed multivariate correlation analysis approach is evaluated on the KDD CUP 99 dataset. The evaluation shows encouraging results with average 99.96% detection rate and 2.08% false positive rate. Comparisons also show that our multivariate correlation analysis based detection approach outperforms some other current researches in detecting DoS attacks.
引用
下载
收藏
页码:756 / +
页数:3
相关论文
共 50 条
  • [31] Denial-of-Service Attack Detection over IPv6 Network Based on KNN Algorithm
    Alharbi, Yasser
    Alferaidi, Ali
    Yadav, Kusum
    Dhiman, Gaurav
    Kautish, Sandeep
    WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2021, 2021
  • [32] Mitigation of Hardware Trojan based Denial-of-Service attack for secure NoCs
    Boraten, Travis
    Kodi, Avinash
    JOURNAL OF PARALLEL AND DISTRIBUTED COMPUTING, 2018, 111 : 24 - 38
  • [33] Denial-of-service on fpga-based cloud infrastructures — attack and defense
    La T.
    Pham K.
    Powell J.
    Koch D.
    IACR Transactions on Cryptographic Hardware and Embedded Systems, 2021, 2021 (03): : 441 - 464
  • [34] Control Channel Denial-of-Service Attack in SDN-Based Networks
    Sriskandarajah, Shriparen
    McKague, Matthew
    Foo, Ernest
    Ragel, Roshan G.
    Karunarathna, Suneth Namal
    Jadidi, Zahra
    MERCON 2020: 6TH INTERNATIONAL MULTIDISCIPLINARY MORATUWA ENGINEERING RESEARCH CONFERENCE (MERCON), 2020, : 325 - 330
  • [35] The use of statistical features for low-rate denial-of-service attack detection
    Fuladi, Ramin
    Baykas, Tuncer
    Anarim, Emin
    ANNALS OF TELECOMMUNICATIONS, 2024, 79 (9-10) : 679 - 691
  • [36] Obfuscating Software Puzzle for Denial-of-Service Attack Mitigation
    Wu, Yongdong
    Suhendra, Vivy
    Saputra, Hendra
    Zhao, Zhigang
    2016 IEEE INTERNATIONAL CONFERENCE ON INTERNET OF THINGS (ITHINGS) AND IEEE GREEN COMPUTING AND COMMUNICATIONS (GREENCOM) AND IEEE CYBER, PHYSICAL AND SOCIAL COMPUTING (CPSCOM) AND IEEE SMART DATA (SMARTDATA), 2016, : 115 - 122
  • [37] The SYN flood denial-of-service attack in a protected network
    Thead, EA
    8TH WORLD MULTI-CONFERENCE ON SYSTEMICS, CYBERNETICS AND INFORMATICS, VOL X, PROCEEDINGS: SYSTEMICS AND INFORMATION SYSTEMS, TECHNOLOGIES AND APPLICATIONS, 2004, : 86 - 89
  • [38] Key agreement protocols resistant to a denial-of-service attack
    Hirose, Shouichi
    Matsura, Kanta
    IEICE Transactions on Information and Systems, 2001, E84-D (04) : 477 - 484
  • [39] Distributed denial-of-service and intrusion detection
    Zhou, Xiaobo
    Xu, Cheng-Zhong
    JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2007, 30 (03) : 819 - 822
  • [40] Optimal Denial-of-Service Attack Scheduling With Energy Constraint
    Zhang, Heng
    Cheng, Peng
    Shi, Ling
    Chen, Jiming
    IEEE TRANSACTIONS ON AUTOMATIC CONTROL, 2015, 60 (11) : 3023 - 3028