Detection of Denial-of-Service Attacks Based on Computer Vision Techniques

被引:116
作者
Tan, Zhiyuan [1 ]
Jamdagni, Aruna [3 ]
He, Xiangjian [2 ]
Nanda, Priyadarsi [2 ]
Liu, Ren Ping [4 ]
Hu, Jiankun [5 ]
机构
[1] Univ Twente, Serv Cybersecur & Safety Grp, NL-7500 AE Enschede, Netherlands
[2] Univ Technol Sydney, Ctr Innovat IT Serv & Applicat iNEXT, Sydney, NSW 2007, Australia
[3] Univ Western Sydney, Sch Comp & Math, Parramatta, Australia
[4] CSIRO, ICT, Marsfield, Australia
[5] Univ New S Wales, Cyber Secur, Sydney, NSW 2052, Australia
关键词
denial-of-service; anomaly-based detection; earth mover's distance; computer vision; EARTH-MOVERS-DISTANCE; INTRUSION-DETECTION; ANOMALY DETECTION; NETWORK INTRUSION; ALGORITHM;
D O I
10.1109/TC.2014.2375218
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Detection of Denial-of-Service (DoS) attacks has attracted researchers since 1990s. A variety of detection systems has been proposed to achieve this task. Unlike the existing approaches based on machine learning and statistical analysis, the proposed system treats traffic records as images and detection of DoS attacks as a computer vision problem. A multivariate correlation analysis approach is introduced to accurately depict network traffic records and to convert the records into their respective images. The images of network traffic records are used as the observed objects of our proposed DoS attack detection system, which is developed based on a widely used dissimilarity measure, namely Earth Mover's Distance (EMD). EMD takes cross-bin matching into account and provides a more accurate evaluation on the dissimilarity between distributions than some other well-known dissimilarity measures, such as Minkowski-form distance L-p and X-2 statistics. These unique merits facilitate our proposed system with effective detection capabilities. To evaluate the proposed EMD-based detection system, ten-fold cross-validations are conducted using KDD Cup 99 dataset and ISCX 2012 IDS Evaluation dataset. The results presented in the system evaluation section illustrate that our detection system can detect unknown DoS attacks and achieves 99.95 percent detection accuracy on KDD Cup 99 dataset and 90.12 percent detection accuracy on ISCX 2012 IDS evaluation dataset with processing capability of approximately 59,000 traffic records per second.
引用
收藏
页码:2519 / 2533
页数:15
相关论文
共 47 条
[1]  
[Anonymous], 2000, P DARPA INFORM SURVI, DOI [DOI 10.1109/DISCEX.2000.821515, 10.1109/DISCEX.2000.821515]
[2]  
[Anonymous], 2013, HDB ASIAN CRIMINOLOG, DOI DOI 10.1007/978-1-4614-5218-8
[3]   Scalable Lookahead Regular Expression Detection System for Deep Packet Inspection [J].
Bando, Masanori ;
Artan, N. Sertac ;
Chao, H. Jonathan .
IEEE-ACM TRANSACTIONS ON NETWORKING, 2012, 20 (03) :699-714
[4]   Accelerating Multipattern Matching on Compressed HTTP Traffic [J].
Bremler-Barr, Anat ;
Koral, Yaron .
IEEE-ACM TRANSACTIONS ON NETWORKING, 2012, 20 (03) :970-983
[5]  
Brugger S., 2004, Data mining methods for network intrusion detection
[6]   AN INTRUSION-DETECTION MODEL [J].
DENNING, DE .
IEEE TRANSACTIONS ON SOFTWARE ENGINEERING, 1987, 13 (02) :222-232
[7]   DDoS attacks and defense mechanisms: classification and state-of-the-art [J].
Douligeris, C ;
Mitrokotsa, A .
COMPUTER NETWORKS, 2004, 44 (05) :643-666
[8]  
Engen Vegard, 2011, Intelligent Data Analysis, V15, P251, DOI 10.3233/IDA-2010-0466
[9]  
Fontugne R., 2008, P 4 AS C INT ENG, P17, DOI 10.1145/1503370.1503377
[10]   Detecting phishing web pages with visual similarity assessment based on Earth Mover's Distance (EMD) [J].
Fu, Anthony Y. ;
Wenyin, Liu ;
Deng, Xiaotie .
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2006, 3 (04) :301-311