Detecting network cyber-attacks using an integrated statistical approach

被引:17
|
作者
Bouyeddou, Benamar [1 ]
Harrou, Fouzi [2 ]
Kadri, Benamar [1 ]
Sun, Ying [2 ]
机构
[1] Abou Bekr Belkaid Univ, STIC Lab, Dept Telecommun, Tilimsen, Algeria
[2] King Abdullah Univ Sci & Technol KAUST, Comp Elect & Math Sci & Engn CEMSE Div, Thuwal 239556900, Saudi Arabia
关键词
TCP SYN flood; Smurf attack; KL distance; Anomaly detection; DATA-INJECTION ATTACKS; INTRUSION DETECTION; DDOS; RECOGNITION; MECHANISM;
D O I
10.1007/s10586-020-03203-1
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Anomaly detection in the Internet of Things (IoT) is imperative to improve its reliability and safety. Detecting denial of service (DOS) and distributed DOS (DDOS) is one of the critical security challenges facing network technologies. This paper presents an anomaly detection mechanism using the Kullback-Leibler distance (KLD) to detect DOS and DDOS flooding attacks, including transmission control protocol (TCP) SYN flood, UDP flood, and ICMP-based attacks. This mechanism integrates the desirable properties of KLD, the capacity to quantitatively discriminate between two distributions, with the sensitivity of an exponential smoothing scheme. The primary reason for exponentially smoothing KLD measurements (ES-KLD) is to aggregate all of the information from past and actual samples in the decision rule, making the detector sensitive to small anomalies. Furthermore, a nonparametric approach using kernel density estimation has been used to set a threshold for ES-KLD decision statistic to uncover the presence of attacks. Tests on three publicly available datasets show improved performances of the proposed mechanism in detecting cyber-attacks compared to other conventional monitoring procedures.
引用
下载
收藏
页码:1435 / 1453
页数:19
相关论文
共 50 条
  • [31] Cyber-Attacks in PMU-Based Power Network and Countermeasures
    Tu, Chunming
    He, Xi
    Liu, Xuan
    Li, Peng
    IEEE ACCESS, 2018, 6 : 65594 - 65603
  • [32] Tiny Twins for detecting cyber-attacks at runtime using concise Rebeca time transition system
    Moradi, Fereidoun
    Pourvatan, Bahman
    Abbaspour Asadollah, Sara
    Sirjani, Marjan
    Journal of Parallel and Distributed Computing, 2024, 184
  • [33] How to Detect Cyber-attacks in Unmanned Aerial Vehicles Network?
    Sedjelmaci, Hichem
    Senouci, Sidi Mohammed
    Messous, Mohamed-Ayoub
    2016 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM), 2016,
  • [34] A Deep Neural Network Strategy to Distinguish and Avoid Cyber-Attacks
    Agarwal, Siddhant
    Tyagi, Abhay
    Usha, G.
    ARTIFICIAL INTELLIGENCE AND EVOLUTIONARY COMPUTATIONS IN ENGINEERING SYSTEMS, 2020, 1056 : 673 - 681
  • [35] DDoS Cyber-Attacks Network: Who's Attacking Whom
    Kumar, Sumeet
    Carley, Kathleen M.
    IEEE INTERNATIONAL CONFERENCE ON INTELLIGENCE AND SECURITY INFORMATICS: CYBERSECURITY AND BIG DATA, 2016, : 218 - 218
  • [36] Staying ahead of cyber-attacks
    Green, John
    Network Security, 2015, 2015 (02) : 13 - 16
  • [37] Sequential Detection of Cyber-attacks Using a Classification Filter
    Cai, Xiaojuan
    Feng, Yaokai
    Sakurai, Kouichi
    2021 IEEE INTL CONF ON DEPENDABLE, AUTONOMIC AND SECURE COMPUTING, INTL CONF ON PERVASIVE INTELLIGENCE AND COMPUTING, INTL CONF ON CLOUD AND BIG DATA COMPUTING, INTL CONF ON CYBER SCIENCE AND TECHNOLOGY CONGRESS DASC/PICOM/CBDCOM/CYBERSCITECH 2021, 2021, : 659 - 666
  • [38] A Hilbert-Huang transform approach for predicting cyber-attacks
    Kim, Donghoh
    Paek, Seung-Hyun
    Oh, Hee-Seok
    JOURNAL OF THE KOREAN STATISTICAL SOCIETY, 2008, 37 (03) : 277 - 283
  • [39] A Hilbert-Huang transform approach for predicting cyber-attacks
    Donghoh Kim
    Seung-Hyun Paek
    Hee-Seok Oh
    Journal of the Korean Statistical Society, 2008, 37 : 277 - 283
  • [40] Network slicing as 6G security mechanism to mitigate cyber-attacks: the RIGOUROUS approach
    Escolar, Antonio Matencio
    Bernabe, Jorge Bernal
    Calero, Jose Maria Alcaraz
    Wang, Qi
    Skarmeta, Antonio
    2024 IEEE 10TH INTERNATIONAL CONFERENCE ON NETWORK SOFTWARIZATION, NETSOFT 2024, 2024, : 387 - 392