Multi-Perspective Content Delivery Networks Security Framework Using Optimized Unsupervised Anomaly Detection

被引:19
作者
Yang, Li [1 ]
Moubayed, Abdallah [1 ]
Shami, Abdallah [1 ]
Heidari, Parisa [2 ]
Boukhtouta, Amine [3 ]
Larabi, Adel [4 ]
Brunner, Richard [4 ]
Preda, Stere [3 ]
Migault, Daniel [3 ]
机构
[1] Western Univ, Dept Elect & Comp Engn, London, ON N6A 3K7, Canada
[2] Ericsson Montreal, Internet Things, St Laurent, PQ H4S 0B6, Canada
[3] Ericsson Montreal, Res Secur, St Laurent, PQ H4S 0B6, Canada
[4] Ericsson Montreal, One Network, St Laurent, PQ H4S 0B6, Canada
来源
IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT | 2022年 / 19卷 / 01期
基金
加拿大自然科学与工程研究理事会;
关键词
Servers; Anomaly detection; Image edge detection; Internet; IP networks; Pollution; Protocols; Cache pollution attacks; DoS attacks; anomaly detection; content delivery networks; Gaussian mixture model; Bayesian optimization; CACHE POLLUTION ATTACKS; OF-THE-ART; SYSTEMS;
D O I
10.1109/TNSM.2021.3100308
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Content delivery networks (CDNs) provide efficient content distribution over the Internet. CDNs improve the connectivity and efficiency of global communications, but their caching mechanisms may be breached by cyber-attackers. Among the security mechanisms, effective anomaly detection forms an important part of CDN security enhancement. In this work, we propose a multi-perspective unsupervised learning framework for anomaly detection in CDNs. In the proposed framework, a multi-perspective feature engineering approach, an optimized unsupervised anomaly detection model that utilizes an isolation forest and a Gaussian mixture model, and a multi-perspective validation method, are developed to detect abnormal behaviors in CDNs mainly from the client Internet Protocol (IP) and node perspectives, therefore to identify the denial of service (DoS) and cache pollution attack (CPA) patterns. Experimental results are presented based on the analytics of eight days of real-world CDN log data provided by a major CDN operator. Through experiments, the abnormal contents, compromised nodes, malicious IPs, as well as their corresponding attack types, are identified effectively by the proposed framework and validated by multiple cybersecurity experts. This shows the effectiveness of the proposed method when applied to real-world CDN data.
引用
收藏
页码:686 / 705
页数:20
相关论文
共 58 条
[1]  
Aliyev R., 2013, P INT C SEC MAN, P1
[2]  
Andrew Moore M. C., 2005, PR0513 QUEEN MARY U
[3]   Abnormal-node Detection Based on Spatio-temporal and Multivariate-attribute Correlation in Wireless Sensor Networks [J].
Berjab, Nesrine ;
Hieu Hanh Le ;
Yu, Chia-Mu ;
Kuo, Sy-Yen ;
Yokota, Haruo .
2018 16TH IEEE INT CONF ON DEPENDABLE, AUTONOM AND SECURE COMP, 16TH IEEE INT CONF ON PERVAS INTELLIGENCE AND COMP, 4TH IEEE INT CONF ON BIG DATA INTELLIGENCE AND COMP, 3RD IEEE CYBER SCI AND TECHNOL CONGRESS (DASC/PICOM/DATACOM/CYBERSCITECH), 2018, :568-575
[4]  
Bitaab M, 2017, INT ISC CONF INFO SE, P8, DOI 10.1109/ISCISC.2017.8488375
[5]   Fingerprinting Crowd Events in Content Delivery Networks: A Semi-supervised Methodology [J].
Boukhtouta, Amine ;
Pourzandi, Makan ;
Brunner, Richard ;
Dault, Stephane .
DATA AND APPLICATIONS SECURITY AND PRIVACY XXXII, DBSEC 2018, 2018, 10980 :312-329
[6]  
Caltagirone S., 2013, ADA586960 DTIC
[7]  
Carlin A, 2015, INT J ADV COMPUT SC, V6, P1
[8]   Exploiting ICN for Efficient Content Dissemination in CDNs [J].
Chen, Jiachen ;
Xu, Haoyuan ;
Penugonde, Shashikanth ;
Zhang, Yanyong ;
Raychaudhuri, Dipankar .
PROCEEDINGS OF 2016 FOURTH IEEE WORKSHOP ON HOT TOPICS IN WEB SYSTEMS AND TECHNOLOGIES (HOTWEB), 2016, :14-19
[9]   Detecting Malicious Websites by Learning IP Address Features [J].
Chiba, Daiki ;
Tobe, Kazuhiro ;
Mori, Tatsuya ;
Goto, Shigeki .
2012 IEEE/IPSJ 12TH INTERNATIONAL SYMPOSIUM ON APPLICATIONS AND THE INTERNET (SAINT), 2012, :29-39
[10]   A lightweight mechanism for detection of cache pollution attacks in Named Data Networking [J].
Conti, Mauro ;
Gasti, Paolo ;
Teoli, Marco .
COMPUTER NETWORKS, 2013, 57 (16) :3178-3191