Detecting network cyber-attacks using an integrated statistical approach

被引:17
|
作者
Bouyeddou, Benamar [1 ]
Harrou, Fouzi [2 ]
Kadri, Benamar [1 ]
Sun, Ying [2 ]
机构
[1] Abou Bekr Belkaid Univ, STIC Lab, Dept Telecommun, Tilimsen, Algeria
[2] King Abdullah Univ Sci & Technol KAUST, Comp Elect & Math Sci & Engn CEMSE Div, Thuwal 239556900, Saudi Arabia
关键词
TCP SYN flood; Smurf attack; KL distance; Anomaly detection; DATA-INJECTION ATTACKS; INTRUSION DETECTION; DDOS; RECOGNITION; MECHANISM;
D O I
10.1007/s10586-020-03203-1
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Anomaly detection in the Internet of Things (IoT) is imperative to improve its reliability and safety. Detecting denial of service (DOS) and distributed DOS (DDOS) is one of the critical security challenges facing network technologies. This paper presents an anomaly detection mechanism using the Kullback-Leibler distance (KLD) to detect DOS and DDOS flooding attacks, including transmission control protocol (TCP) SYN flood, UDP flood, and ICMP-based attacks. This mechanism integrates the desirable properties of KLD, the capacity to quantitatively discriminate between two distributions, with the sensitivity of an exponential smoothing scheme. The primary reason for exponentially smoothing KLD measurements (ES-KLD) is to aggregate all of the information from past and actual samples in the decision rule, making the detector sensitive to small anomalies. Furthermore, a nonparametric approach using kernel density estimation has been used to set a threshold for ES-KLD decision statistic to uncover the presence of attacks. Tests on three publicly available datasets show improved performances of the proposed mechanism in detecting cyber-attacks compared to other conventional monitoring procedures.
引用
收藏
页码:1435 / 1453
页数:19
相关论文
共 50 条
  • [1] Detecting network cyber-attacks using an integrated statistical approach
    Benamar Bouyeddou
    Fouzi Harrou
    Benamar Kadri
    Ying Sun
    [J]. Cluster Computing, 2021, 24 : 1435 - 1453
  • [2] Detecting cyber-attacks using a CRPS-based monitoring approach
    Harrou, Fouzi
    Bouyeddou, Benamar
    Sun, Ying
    Kadri, Benamar
    [J]. 2018 IEEE SYMPOSIUM SERIES ON COMPUTATIONAL INTELLIGENCE (IEEE SSCI), 2018, : 618 - 622
  • [3] A Proposal for Detecting Distributed Cyber-Attacks Using Automatic Thresholding
    Feng, Yaokai
    Hori, Yoshiaki
    Sakurai, Kouichi
    [J]. 2015 10TH ASIA JOINT CONFERENCE ON INFORMATION SECURITY (ASIAJCIS), 2015, : 152 - 159
  • [4] A System for Detecting Targeted Cyber-Attacks Using Attack Patterns
    Herwono, Ian
    El-Moussa, Fadi Ali
    [J]. INFORMATION SYSTEMS SECURITY AND PRIVACY, 2018, 867 : 20 - 34
  • [5] Detecting Cyber-attacks in the Industrial Internet of Things using a Hybrid Deep Random Neural Network
    Pathak, Mrunal K.
    Bang, Arti
    Gawande, Ranjit M.
    Banait, Archana S.
    Sambare, G. B.
    Shaikh, Ashfaq Amir
    [J]. JOURNAL OF ELECTRICAL SYSTEMS, 2024, 20 (01) : 165 - 174
  • [6] Secure SCADA Communication Network for Detecting and Preventing Cyber-Attacks on Power Systems
    Chalamasetty, Goutham K.
    Mandal, Paras
    Tseng, Tzu-Liang
    [J]. 2016 CLEMSON UNIVERSITY POWER SYSTEMS CONFERENCE (PSC), 2016,
  • [7] Integrated Approach to Diagnostics of Failures and Cyber-Attacks in Industrial Control Systems
    Syfert, Michal
    Ordys, Andrzej
    Koscielny, Jan Maciej
    Wnuk, Pawel
    Mozaryn, Jakub
    Kukielka, Krzysztof
    [J]. ENERGIES, 2022, 15 (17)
  • [8] Using Ensemble Learning Approach To Identify Rare Cyber-Attacks In Network Traffic Data
    Doreswamy
    Hooshmand, Mohammad Kazim
    [J]. ICACSIS 2020: 2020 12TH INTERNATIONAL CONFERENCE ON ADVANCED COMPUTER SCIENCE AND INFORMATION SYSTEMS (ICACSIS), 2020, : 141 - 146
  • [9] Securing Smart Grids: Deep Reinforcement Learning Approach for Detecting Cyber-Attacks
    El-Toukhy, Ahmed T.
    Elgarhy, Islam
    Badr, Mahmoud M.
    Mahmoud, Mohamed
    Fouda, Mostafa M.
    Ibrahem, Mohamed I.
    Amsaad, Fathi
    [J]. 2024 INTERNATIONAL CONFERENCE ON SMART APPLICATIONS, COMMUNICATIONS AND NETWORKING, SMARTNETS-2024, 2024,
  • [10] A Method of Synchrophasor Technology for Detecting and Analyzing Cyber-Attacks
    Al-Sarray, Muthanna
    McCann, Roy A.
    [J]. 2016 NORTH AMERICAN POWER SYMPOSIUM (NAPS), 2016,