Denial-of-Service Attack Detection Based on Multivariate Correlation Analysis

被引:0
|
作者
Tan, Zhiyuan [1 ]
Jamdagni, Aruna [1 ,2 ]
He, Xiangjian [1 ]
Nanda, Priyadarsi [1 ]
Liu, Ren Ping
机构
[1] Univ Technol Sydney, Ctr Innovat IT Serv & Applicat iNEXT, Sydney, NSW 2007, Australia
[2] CSIRO Marsfield, Marsfield, NSW, Australia
来源
关键词
Denial-of-Service Attack; Euclidean Distance Map; Multivariate Correlations; Anomaly Detection; ANOMALY DETECTION; INTRUSION DETECTION; NETWORK INTRUSION;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
The reliability and availability of network services are being threatened by the growing number of Denial-of-Service (DoS) attacks. Effective mechanisms for DoS attack detection are demanded. Therefore, we propose a multivariate correlation analysis approach to investigate and extract second-order statistics from the observed network traffic records. These second-order statistics extracted by the proposed analysis approach can provide important correlative information hiding among the features. By making use of this hidden information, the detection accuracy can be significantly enhanced. The effectiveness of the proposed multivariate correlation analysis approach is evaluated on the KDD CUP 99 dataset. The evaluation shows encouraging results with average 99.96% detection rate and 2.08% false positive rate. Comparisons also show that our multivariate correlation analysis based detection approach outperforms some other current researches in detecting DoS attacks.
引用
下载
收藏
页码:756 / +
页数:3
相关论文
共 50 条
  • [41] Gradient Techniques to Predict Distributed Denial-Of-Service Attack
    Qamar R.
    Iraqi Journal for Computer Science and Mathematics, 2022, 3 (02): : 55 - 71
  • [42] A BitTorrent-driven distributed denial-of-service attack
    Harrington, Jerome
    Kuwanoe, Corey
    Zou, Cliff C.
    2007 THIRD INTERNATIONAL CONFERENCE ON SECURITY AND PRIVACY IN COMMUNICATION NETWORKS AND WORKSHOPS, 2007, : 261 - 268
  • [43] Key agreement protocols resistant to a denial-of-service attack
    Hirose, S
    Matsuura, K
    IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2001, E84D (04): : 477 - 484
  • [44] On the use of principal component analysis in the entropy based detection of denial-of-service attacks
    Basicevic, Ilija
    Blazic, Nikola
    Ocovaj, Stanislav
    SECURITY AND PRIVACY, 2022, 5 (02):
  • [45] Denial-of-service attack hits Ohio State University
    不详
    COMPUTERS & SECURITY, 2003, 22 (03) : 179 - 179
  • [46] Detection and trace back of low and high volume of distributed denial-of-service attack based on statistical measures
    Thangavel, Subburaj
    Kannan, Suthendran
    CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2022, 34 (08):
  • [47] Machine-Learning-Based Online Distributed Denial-of-Service Attack Detection Using Spark Streaming
    Zhou, Baojun
    Li, Jie
    Wu, Jinsong
    Guo, Song
    Gu, Yu
    Li, Zhetao
    2018 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2018,
  • [48] Detection of Denial-of-Service Attacks Based on Computer Vision Techniques
    Tan, Zhiyuan
    Jamdagni, Aruna
    He, Xiangjian
    Nanda, Priyadarsi
    Liu, Ren Ping
    Hu, Jiankun
    IEEE TRANSACTIONS ON COMPUTERS, 2015, 64 (09) : 2519 - 2533
  • [49] Stability Analysis of an Advanced Persistent Distributed Denial-of-Service Attack Dynamical Model
    Zhang, Chunming
    Xiao, Jingwei
    SECURITY AND COMMUNICATION NETWORKS, 2018,
  • [50] Service discovery with denial-of-service attack resistance using risk evaluation
    Nakagawa, Tomohiro
    Miyake, Motoharu
    Inamura, Yu
    Inamura, Hiroshi
    20TH INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS, VOL 1, PROCEEDINGS, 2006, : 138 - +