Detecting network cyber-attacks using an integrated statistical approach

被引:17
|
作者
Bouyeddou, Benamar [1 ]
Harrou, Fouzi [2 ]
Kadri, Benamar [1 ]
Sun, Ying [2 ]
机构
[1] Abou Bekr Belkaid Univ, STIC Lab, Dept Telecommun, Tilimsen, Algeria
[2] King Abdullah Univ Sci & Technol KAUST, Comp Elect & Math Sci & Engn CEMSE Div, Thuwal 239556900, Saudi Arabia
关键词
TCP SYN flood; Smurf attack; KL distance; Anomaly detection; DATA-INJECTION ATTACKS; INTRUSION DETECTION; DDOS; RECOGNITION; MECHANISM;
D O I
10.1007/s10586-020-03203-1
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Anomaly detection in the Internet of Things (IoT) is imperative to improve its reliability and safety. Detecting denial of service (DOS) and distributed DOS (DDOS) is one of the critical security challenges facing network technologies. This paper presents an anomaly detection mechanism using the Kullback-Leibler distance (KLD) to detect DOS and DDOS flooding attacks, including transmission control protocol (TCP) SYN flood, UDP flood, and ICMP-based attacks. This mechanism integrates the desirable properties of KLD, the capacity to quantitatively discriminate between two distributions, with the sensitivity of an exponential smoothing scheme. The primary reason for exponentially smoothing KLD measurements (ES-KLD) is to aggregate all of the information from past and actual samples in the decision rule, making the detector sensitive to small anomalies. Furthermore, a nonparametric approach using kernel density estimation has been used to set a threshold for ES-KLD decision statistic to uncover the presence of attacks. Tests on three publicly available datasets show improved performances of the proposed mechanism in detecting cyber-attacks compared to other conventional monitoring procedures.
引用
收藏
页码:1435 / 1453
页数:19
相关论文
共 50 条
  • [41] Shielding IoT against Cyber-Attacks: An Event-Based Approach Using SIEM
    Diaz Lopez, Daniel
    Blanco Uribe, Maria
    Santiago Cely, Claudia
    Vega Torres, Andres
    Moreno Guataquira, Nicolas
    Moron Castro, Stefany
    Nespoli, Pantaleone
    Gomez Marmol, Felix
    WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2018,
  • [42] Detecting Cyber-Attacks on Wireless Mobile Networks Using Multicriterion Fuzzy Classifier with Genetic Attribute Selection
    El-Alfy, El-Sayed M.
    Al-Obeidat, Feras N.
    MOBILE INFORMATION SYSTEMS, 2015, 2015
  • [43] Quantitative Risk Assessment of Cyber-Physical System for Cyber-attacks in Distribution Network
    Zhang Y.
    Ni M.
    Sun Y.
    Li M.
    Dianli Xitong Zidonghua/Automation of Electric Power Systems, 2019, 43 (21): : 12 - 22and33
  • [44] Impact Of Cyber-Attacks On Critical Infrastructure
    Thakur, Kutub
    Ali, Md Liakat
    Jiang, Ning
    Qiu, Meikang
    2016 IEEE 2ND INTERNATIONAL CONFERENCE ON BIG DATA SECURITY ON CLOUD (BIGDATASECURITY), IEEE INTERNATIONAL CONFERENCE ON HIGH PERFORMANCE AND SMART COMPUTING (HPSC), AND IEEE INTERNATIONAL CONFERENCE ON INTELLIGENT DATA AND SECURITY (IDS), 2016, : 183 - 186
  • [45] The Impact of US Cyber Policies on Cyber-Attacks Trend
    Kumar, Sumeet
    Benigni, Matthew
    Carley, Kathleen M.
    IEEE INTERNATIONAL CONFERENCE ON INTELLIGENCE AND SECURITY INFORMATICS: CYBERSECURITY AND BIG DATA, 2016, : 181 - 186
  • [46] Cyber-attacks visualisation and prediction in complex multi-stage network
    Mishra, Shailendra
    Alotaibi, Waleed Bander
    Alshehri, Mohammed
    Saxena, Sharad
    INTERNATIONAL JOURNAL OF COMPUTER APPLICATIONS IN TECHNOLOGY, 2022, 68 (04) : 345 - 356
  • [47] How to prevent cyber-attacks in inter-vehicle communication network?
    Sedjelmaci, Hichem
    Bouali, Tarek
    Messous, Mohamed-Ayoub
    Senouci, Sidi Mohammed
    2015 INTERNATIONAL CONFERENCE ON PROTOCOL ENGINEERING (ICPE) AND INTERNATIONAL CONFERENCE ON NEW TECHNOLOGIES OF DISTRIBUTED SYSTEMS (NTDS), 2015,
  • [48] Cyber-Attacks in Modular Multilevel Converters
    Burgos-Mellado, Claudio
    Donoso, Felipe
    Dragicevic, Tomislav
    Cardenas-Dobson, Roberto
    Wheeler, Patrick
    Clare, Jon
    Watson, Alan
    IEEE TRANSACTIONS ON POWER ELECTRONICS, 2022, 37 (07) : 8488 - 8501
  • [49] Estimates of the macroeconomic costs of cyber-attacks
    Dieye, Rokhaya
    Bounfour, Ahmed
    Ozaygen, Altay
    Kammoun, Niaz
    RISK MANAGEMENT AND INSURANCE REVIEW, 2020, 23 (02) : 183 - 208
  • [50] Cyber-Attacks Against Transportation Infrastructure
    Gercke, Marco
    TRANSPORTATION SECURITY AGAINST TERRORISM, 2009, 54 : 151 - 161