Detecting network cyber-attacks using an integrated statistical approach

被引:19
|
作者
Bouyeddou, Benamar [1 ]
Harrou, Fouzi [2 ]
Kadri, Benamar [1 ]
Sun, Ying [2 ]
机构
[1] Abou Bekr Belkaid Univ, STIC Lab, Dept Telecommun, Tilimsen, Algeria
[2] King Abdullah Univ Sci & Technol KAUST, Comp Elect & Math Sci & Engn CEMSE Div, Thuwal 239556900, Saudi Arabia
来源
CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS | 2021年 / 24卷 / 02期
关键词
TCP SYN flood; Smurf attack; KL distance; Anomaly detection; DATA-INJECTION ATTACKS; INTRUSION DETECTION; DDOS; RECOGNITION; MECHANISM;
D O I
10.1007/s10586-020-03203-1
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Anomaly detection in the Internet of Things (IoT) is imperative to improve its reliability and safety. Detecting denial of service (DOS) and distributed DOS (DDOS) is one of the critical security challenges facing network technologies. This paper presents an anomaly detection mechanism using the Kullback-Leibler distance (KLD) to detect DOS and DDOS flooding attacks, including transmission control protocol (TCP) SYN flood, UDP flood, and ICMP-based attacks. This mechanism integrates the desirable properties of KLD, the capacity to quantitatively discriminate between two distributions, with the sensitivity of an exponential smoothing scheme. The primary reason for exponentially smoothing KLD measurements (ES-KLD) is to aggregate all of the information from past and actual samples in the decision rule, making the detector sensitive to small anomalies. Furthermore, a nonparametric approach using kernel density estimation has been used to set a threshold for ES-KLD decision statistic to uncover the presence of attacks. Tests on three publicly available datasets show improved performances of the proposed mechanism in detecting cyber-attacks compared to other conventional monitoring procedures.
引用
收藏
页码:1435 / 1453
页数:19
相关论文
共 50 条
  • [21] INVESTIGATION ON CYBER-ATTACKS AGAINST IN-VEHICLE NETWORK
    Kumar, S. Vishnu
    Mary, G. Aloy Anuja
    Suresh, P.
    Uthirasamy, R.
    2021 7TH INTERNATIONAL CONFERENCE ON ELECTRICAL ENERGY SYSTEMS (ICEES), 2021, : 305 - 311
  • [22] Strategy Matrix for Containing Cyber-Attacks: A Generic Approach
    Mpofu, Nkosinathi
    Chikati, Ronald
    PROCEEDINGS OF THE 10TH INTERNATIONAL CONFERENCE ON CYBER WARFARE AND SECURITY (ICCWS-2015), 2015, : 207 - 215
  • [23] Stochastic gradient boosted distributed decision trees security approach for detecting cyber anomalies and classifying multiclass cyber-attacks
    Sekhar, J.C.
    Priyanka, R.
    Nanda, Ashok Kumar
    Josephson, P Joel
    Ebinezer, M.J.D.
    Devi, T Kalavathi
    Computers and Security, 2025, 151
  • [24] Detection of cyber-attacks in network control planes using Hidden Markov Model
    Desgeorges, Loic
    Georges, Jean-Philippe
    Divoux, Thierry
    IFAC PAPERSONLINE, 2022, 55 (28): : 66 - 72
  • [25] A Behavior-Based Online Engine for Detecting Distributed Cyber-Attacks
    Feng, Yaokai
    Hori, Yoshiaki
    Sakurai, Kouichi
    INFORMATION SECURITY APPLICATIONS, WISA 2016, 2017, 10144 : 79 - 89
  • [26] From Detecting Cyber-Attacks to Mitigating Risk Within a Hybrid Environment
    Foglietta, Chiara
    Masucci, Dario
    Palazzo, Cosimo
    Santini, Riccardo
    Panzieri, Stefano
    Rosa, Luis
    Cruz, Tiago
    Lev, Leonid
    IEEE SYSTEMS JOURNAL, 2019, 13 (01): : 424 - 435
  • [27] Integrated Simulation to Analyze the Impact of Cyber-Attacks on the Power Grid
    Liu, R.
    Srivastava, A. .
    2015 WORKSHOP ON MODELING AND SIMULATION OF CYBER-PHYSICAL ENERGY SYSTEMS (MSCPES), 2015,
  • [28] Detecting and Handling Cyber-Attacks in Model Predictive Control of Chemical Processes
    Wu, Zhe
    Albalawi, Fahad
    Zhang, Junfeng
    Zhang, Zhihao
    Durand, Helen
    Christofides, Panagiotis D.
    MATHEMATICS, 2018, 6 (10)
  • [29] Cyber-attacks and banking intermediation
    Boungou, Whelsy
    ECONOMICS LETTERS, 2023, 233
  • [30] Predicting Consequences of Cyber-Attacks
    Datta, Prerit
    Lodinger, Natalie
    Namin, Akbar Siami
    Jones, Keith S.
    2020 IEEE INTERNATIONAL CONFERENCE ON BIG DATA (BIG DATA), 2020, : 2073 - 2078