Detecting network cyber-attacks using an integrated statistical approach

被引:17
|
作者
Bouyeddou, Benamar [1 ]
Harrou, Fouzi [2 ]
Kadri, Benamar [1 ]
Sun, Ying [2 ]
机构
[1] Abou Bekr Belkaid Univ, STIC Lab, Dept Telecommun, Tilimsen, Algeria
[2] King Abdullah Univ Sci & Technol KAUST, Comp Elect & Math Sci & Engn CEMSE Div, Thuwal 239556900, Saudi Arabia
关键词
TCP SYN flood; Smurf attack; KL distance; Anomaly detection; DATA-INJECTION ATTACKS; INTRUSION DETECTION; DDOS; RECOGNITION; MECHANISM;
D O I
10.1007/s10586-020-03203-1
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Anomaly detection in the Internet of Things (IoT) is imperative to improve its reliability and safety. Detecting denial of service (DOS) and distributed DOS (DDOS) is one of the critical security challenges facing network technologies. This paper presents an anomaly detection mechanism using the Kullback-Leibler distance (KLD) to detect DOS and DDOS flooding attacks, including transmission control protocol (TCP) SYN flood, UDP flood, and ICMP-based attacks. This mechanism integrates the desirable properties of KLD, the capacity to quantitatively discriminate between two distributions, with the sensitivity of an exponential smoothing scheme. The primary reason for exponentially smoothing KLD measurements (ES-KLD) is to aggregate all of the information from past and actual samples in the decision rule, making the detector sensitive to small anomalies. Furthermore, a nonparametric approach using kernel density estimation has been used to set a threshold for ES-KLD decision statistic to uncover the presence of attacks. Tests on three publicly available datasets show improved performances of the proposed mechanism in detecting cyber-attacks compared to other conventional monitoring procedures.
引用
收藏
页码:1435 / 1453
页数:19
相关论文
共 50 条
  • [41] Detecting Cyber-Attacks on Wireless Mobile Networks Using Multicriterion Fuzzy Classifier with Genetic Attribute Selection
    El-Alfy, El-Sayed M.
    Al-Obeidat, Feras N.
    [J]. MOBILE INFORMATION SYSTEMS, 2015, 2015
  • [42] The Impact of US Cyber Policies on Cyber-Attacks Trend
    Kumar, Sumeet
    Benigni, Matthew
    Carley, Kathleen M.
    [J]. IEEE INTERNATIONAL CONFERENCE ON INTELLIGENCE AND SECURITY INFORMATICS: CYBERSECURITY AND BIG DATA, 2016, : 181 - 186
  • [43] Impact Of Cyber-Attacks On Critical Infrastructure
    Thakur, Kutub
    Ali, Md Liakat
    Jiang, Ning
    Qiu, Meikang
    [J]. 2016 IEEE 2ND INTERNATIONAL CONFERENCE ON BIG DATA SECURITY ON CLOUD (BIGDATASECURITY), IEEE INTERNATIONAL CONFERENCE ON HIGH PERFORMANCE AND SMART COMPUTING (HPSC), AND IEEE INTERNATIONAL CONFERENCE ON INTELLIGENT DATA AND SECURITY (IDS), 2016, : 183 - 186
  • [44] Cyber-attacks visualisation and prediction in complex multi-stage network
    Mishra, Shailendra
    Alotaibi, Waleed Bander
    Alshehri, Mohammed
    Saxena, Sharad
    [J]. INTERNATIONAL JOURNAL OF COMPUTER APPLICATIONS IN TECHNOLOGY, 2022, 68 (04) : 345 - 356
  • [45] How to prevent cyber-attacks in inter-vehicle communication network?
    Sedjelmaci, Hichem
    Bouali, Tarek
    Messous, Mohamed-Ayoub
    Senouci, Sidi Mohammed
    [J]. 2015 INTERNATIONAL CONFERENCE ON PROTOCOL ENGINEERING (ICPE) AND INTERNATIONAL CONFERENCE ON NEW TECHNOLOGIES OF DISTRIBUTED SYSTEMS (NTDS), 2015,
  • [46] Cyber-Attacks in Modular Multilevel Converters
    Burgos-Mellado, Claudio
    Donoso, Felipe
    Dragicevic, Tomislav
    Cardenas-Dobson, Roberto
    Wheeler, Patrick
    Clare, Jon
    Watson, Alan
    [J]. IEEE TRANSACTIONS ON POWER ELECTRONICS, 2022, 37 (07) : 8488 - 8501
  • [47] Estimates of the macroeconomic costs of cyber-attacks
    Dieye, Rokhaya
    Bounfour, Ahmed
    Ozaygen, Altay
    Kammoun, Niaz
    [J]. RISK MANAGEMENT AND INSURANCE REVIEW, 2020, 23 (02) : 183 - 208
  • [48] Communications Network Analysis in a SCADA System Testbed Under Cyber-Attacks
    Miciolino, Estefania Etcheves
    Bernieri, Giuseppe
    Pascucci, Federica
    Setola, Roberto
    [J]. 2015 23RD TELECOMMUNICATIONS FORUM TELFOR (TELFOR), 2015, : 341 - 344
  • [49] Cyber-Attacks Against Transportation Infrastructure
    Gercke, Marco
    [J]. TRANSPORTATION SECURITY AGAINST TERRORISM, 2009, 54 : 151 - 161
  • [50] The weakest link on the network: exploiting ADSL routers to perform cyber-attacks
    Stasinopoulos, Anastasios
    Ntantogian, Christoforos
    Xenakis, Christos
    [J]. 2013 IEEE INTERNATIONAL SYMPOSIUM ON SIGNAL PROCESSING AND INFORMATION TECHNOLOGY (IEEE ISSPIT 2013), 2013, : 135 - 139