A Proposal for Detecting Distributed Cyber-Attacks Using Automatic Thresholding

被引:0
|
作者
Feng, Yaokai [1 ,2 ]
Hori, Yoshiaki [2 ,3 ]
Sakurai, Kouichi [1 ,2 ]
机构
[1] Kyushu Univ, Grad Sch Informat Sci & Elect Engn, Fukuoka 812, Japan
[2] Inst Syst Informat Technol & Nanotechnol, Fukuoka, Japan
[3] Saga Univ, Org Gen Educ, Saga, Japan
关键词
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Distributed attacks have reportedly caused the most serious losses in the modern cyber environment. Thus, how to avoid and detect distributed attacks has become one of the most important topics in the cyber security community. Of many approaches for avoiding and detecting cyber-attacks, behavior based method has been attracting great attentions from many researchers and developers. It is well known that, for behavior based cyber-attack detections, the algorithm for extracting normal modes from historic traffic is critically important. In this paper, after the newest algorithms for extracting normal behavior mode from historic traffics are discussed, a novel algorithm is proposed. Its efficiency is examined by experiments using darknet traffic data.
引用
收藏
页码:152 / 159
页数:8
相关论文
共 50 条
  • [1] Detecting Distributed Cyber Attacks in SDN Based on Automatic Thresholding
    Komiya, Ryousuke
    Feng, Yaokai
    Sakurai, Kouichi
    [J]. 2018 SIXTH INTERNATIONAL SYMPOSIUM ON COMPUTING AND NETWORKING WORKSHOPS (CANDARW 2018), 2018, : 417 - 423
  • [2] A Behavior-Based Online Engine for Detecting Distributed Cyber-Attacks
    Feng, Yaokai
    Hori, Yoshiaki
    Sakurai, Kouichi
    [J]. INFORMATION SECURITY APPLICATIONS, WISA 2016, 2017, 10144 : 79 - 89
  • [3] Detecting network cyber-attacks using an integrated statistical approach
    Bouyeddou, Benamar
    Harrou, Fouzi
    Kadri, Benamar
    Sun, Ying
    [J]. CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2021, 24 (02): : 1435 - 1453
  • [4] Detecting network cyber-attacks using an integrated statistical approach
    Benamar Bouyeddou
    Fouzi Harrou
    Benamar Kadri
    Ying Sun
    [J]. Cluster Computing, 2021, 24 : 1435 - 1453
  • [5] A System for Detecting Targeted Cyber-Attacks Using Attack Patterns
    Herwono, Ian
    El-Moussa, Fadi Ali
    [J]. INFORMATION SYSTEMS SECURITY AND PRIVACY, 2018, 867 : 20 - 34
  • [6] On Cyber-attacks Mitigation for Distributed Trajectory Generators
    Al-Rawashdeh, Yazan M.
    Al Janaideh, Mohammad
    [J]. 2023 IEEE/RSJ INTERNATIONAL CONFERENCE ON INTELLIGENT ROBOTS AND SYSTEMS (IROS), 2023, : 9205 - 9210
  • [7] Resilient Distributed Optimization Against Cyber-Attacks
    Gusrialdi, Azwirman
    Qu, Zhihua
    [J]. IEEE CONTROL SYSTEMS LETTERS, 2023, 7 : 3956 - 3961
  • [8] Detection of collaborative misbehaviour in distributed cyber-attacks
    Thoma, Marios
    Hadjicostis, Christoforos N.
    [J]. COMPUTER COMMUNICATIONS, 2021, 174 : 28 - 41
  • [9] Detecting cyber-attacks using a CRPS-based monitoring approach
    Harrou, Fouzi
    Bouyeddou, Benamar
    Sun, Ying
    Kadri, Benamar
    [J]. 2018 IEEE SYMPOSIUM SERIES ON COMPUTATIONAL INTELLIGENCE (IEEE SSCI), 2018, : 618 - 622
  • [10] A Method of Synchrophasor Technology for Detecting and Analyzing Cyber-Attacks
    Al-Sarray, Muthanna
    McCann, Roy A.
    [J]. 2016 NORTH AMERICAN POWER SYMPOSIUM (NAPS), 2016,