Detecting network cyber-attacks using an integrated statistical approach

被引:0
|
作者
Benamar Bouyeddou
Fouzi Harrou
Benamar Kadri
Ying Sun
机构
[1] Abou Bekr Belkaid University,STIC Lab., Department of Telecommunications
[2] King Abdullah University of Science and Technology (KAUST),Computer, Electrical and Mathematical Sciences and Engineering (CEMSE) Division
来源
Cluster Computing | 2021年 / 24卷
关键词
TCP SYN flood; Smurf attack; KL distance; Anomaly detection;
D O I
暂无
中图分类号
学科分类号
摘要
Anomaly detection in the Internet of Things (IoT) is imperative to improve its reliability and safety. Detecting denial of service (DOS) and distributed DOS (DDOS) is one of the critical security challenges facing network technologies. This paper presents an anomaly detection mechanism using the Kullback–Leibler distance (KLD) to detect DOS and DDOS flooding attacks, including transmission control protocol (TCP) SYN flood, UDP flood, and ICMP-based attacks. This mechanism integrates the desirable properties of KLD, the capacity to quantitatively discriminate between two distributions, with the sensitivity of an exponential smoothing scheme. The primary reason for exponentially smoothing KLD measurements (ES–KLD) is to aggregate all of the information from past and actual samples in the decision rule, making the detector sensitive to small anomalies. Furthermore, a nonparametric approach using kernel density estimation has been used to set a threshold for ES-KLD decision statistic to uncover the presence of attacks. Tests on three publicly available datasets show improved performances of the proposed mechanism in detecting cyber-attacks compared to other conventional monitoring procedures.
引用
收藏
页码:1435 / 1453
页数:18
相关论文
共 50 条
  • [11] A Linguistic Analysis Metric in Detecting Ransomware Cyber-attacks
    Florea, Diana
    Patterson, Wayne
    [J]. INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2021, 12 (11) : 517 - 522
  • [12] Detecting Cyber-Attacks Against Cyber-Physical Manufacturing System: A Machining Process Invariant Approach
    Li, Zedong
    Chen, Xin
    Chen, Yuqi
    Li, Shijie
    Wang, Hangyu
    Lv, Shichao
    Sun, Limin
    [J]. IEEE INTERNET OF THINGS JOURNAL, 2024, 11 (10): : 17602 - 17614
  • [13] Integrated protection of industrial control systems from cyber-attacks: the ATENA approach
    Adamsky, F.
    Aubigny, M.
    Battisti, F.
    Carli, M.
    Cimorelli, F.
    Cruz, T.
    Di Giorgio, A.
    Foglietta, C.
    Galli, A.
    Giuseppi, A.
    Liberati, F.
    Neri, A.
    Panzieri, S.
    Pascucci, F.
    Proenca, J.
    Pucci, P.
    Rosa, L.
    Soua, R.
    [J]. INTERNATIONAL JOURNAL OF CRITICAL INFRASTRUCTURE PROTECTION, 2018, 21 : 72 - 82
  • [14] A Feasibility Study of Autonomically Detecting In-process Cyber-Attacks
    Sun, Fangzhou
    Zhang, Peng
    White, Jules
    Schmidt, Douglas C.
    Staples, Jacob
    Krause, Lee
    [J]. 2017 3RD IEEE INTERNATIONAL CONFERENCE ON CYBERNETICS (CYBCONF), 2017, : 407 - 414
  • [15] A Hybrid Framework for Detecting and Eliminating Cyber-Attacks in Power Grids
    Aflaki, Arshia
    Gitizadeh, Mohsen
    Razavi-Far, Roozbeh
    Palade, Vasile
    Ghasemi, Ali Akbar
    [J]. ENERGIES, 2021, 14 (18)
  • [16] Futuristic cyber-attacks
    Chakkaravarthy, S. Sibi
    Sangeetha, D.
    Rathnam, M. Venkata
    Srinithi, K.
    Vaidehi, V.
    [J]. INTERNATIONAL JOURNAL OF KNOWLEDGE-BASED AND INTELLIGENT ENGINEERING SYSTEMS, 2018, 22 (03) : 195 - 204
  • [17] Heuristic approach for mitigation of time Delay cyber-attacks using NLADRC
    Pattanayak, Suvra
    Hote, Yogesh V.
    Peddoju, Sateesh K.
    [J]. 2022 IEEE 10TH POWER INDIA INTERNATIONAL CONFERENCE, PIICON, 2022,
  • [18] Modeling Network Systems Under Simultaneous Cyber-Attacks
    Da, Gaofeng
    Xu, Maochao
    Zhao, Peng
    [J]. IEEE TRANSACTIONS ON RELIABILITY, 2019, 68 (03) : 971 - 984
  • [19] Detecting Electricity Theft Cyber-Attacks in AMI Networks Using Deep Vector Embeddings
    Takiddin, Abdulrahman
    Ismail, Muhammad
    Nabil, Mahmoud
    Mahmoud, Mohamed M. E. A.
    Serpedin, Erchin
    [J]. IEEE SYSTEMS JOURNAL, 2021, 15 (03): : 4189 - 4198
  • [20] INVESTIGATION ON CYBER-ATTACKS AGAINST IN-VEHICLE NETWORK
    Kumar, S. Vishnu
    Mary, G. Aloy Anuja
    Suresh, P.
    Uthirasamy, R.
    [J]. 2021 7TH INTERNATIONAL CONFERENCE ON ELECTRICAL ENERGY SYSTEMS (ICEES), 2021, : 305 - 311