Benford's law behavior of Internet traffic

被引:21
作者
Arshadi, Laleh [1 ]
Jahangir, Amir Hossein [1 ]
机构
[1] Sharif Univ Technol, Dept Comp Engn, Azadi Ave, Tehran 1458889694, Iran
关键词
Computer network traffic analysis; Benford's law; Weibull distribution; Anomaly detection; ANOMALY DETECTION; INTRUSION DETECTION; COEFFICIENTS; FAILURE;
D O I
10.1016/j.jnca.2013.09.007
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper, we analyze the Internet traffic from a different point of view based on Benford's law, an empirical law that describes the distribution of leading digits in a collection of numbers met in naturally occurring phenomena. We claim that Benford's law holds for the inter-arrival times of TCP flows in case of normal traffic. Consequently, any type of anomalies affecting TCP flows, including intentional intrusions or unintended faults and network failures in general, can be detected by investigating the first-digit distributions of the inter-arrival times of TCP SYN packets. In this paper we apply our findings to the detection of intentional attacks, and leave other types of anomalies for future works. We support our claim with related researches that indicate the TCP flow inter-arrival times can be modeled by Weibull distribution with shape parameter less than 1, and show the relation between Weibull distributed data and Benford's law. Finally, we validate our findings on real traffic and achieve encouraging results. (C) 2013 Elsevier Ltd. All rights reserved.
引用
收藏
页码:194 / 205
页数:12
相关论文
共 100 条
[1]  
Abraham A., 2007, Int. J. Netw. Secur, V4, P328
[2]  
Ahmed Tarem, 2007, SYSML 07 P 2 USENIX
[3]   On Mitigating Sampling-Induced Accuracy Loss in Traffic Anomaly Detection Systems [J].
Ali, Sardar ;
Ul Haq, Irfan ;
Rizvi, Sajjad ;
Rasheed, Naurin ;
Sarfraz, Unum ;
Khayam, Ali ;
Mirza, Fauzan .
ACM SIGCOMM COMPUTER COMMUNICATION REVIEW, 2010, 40 (03) :4-16
[4]   The LoSS technique for detecting new denial of service attacks [J].
Allen, WH ;
Marin, GA .
PROCEEDINGS OF THE IEEE SOUTHEASTCON 2004: ENGINEERING CONNECTS, 2004, :302-309
[5]   JPEG steganography detection with Benford's Law [J].
Andriotis, Panagiotis ;
Oikonomou, George ;
Tryfonas, Theo .
DIGITAL INVESTIGATION, 2013, 9 (3-4) :246-257
[6]  
[Anonymous], 1971, Fibonacci Q.
[7]  
[Anonymous], 1992, THESIS
[8]  
[Anonymous], 2005, P 5 ACM SIGCOMM C IN
[9]  
[Anonymous], 2013, NUST TRAFFIC DATASET
[10]   On the TCP Flow Inter-arrival Times Distribution [J].
Arshadi, Laleh ;
Jahangir, Amir Hossein .
UKSIM FIFTH EUROPEAN MODELLING SYMPOSIUM ON COMPUTER MODELLING AND SIMULATION (EMS 2011), 2011, :360-365