An intelligent cyber security system against DDoS attacks in SIP networks

被引:32
作者
Semerci, Murat [1 ]
Cemgil, Ali Taylan [1 ]
Sankur, Bulent [2 ]
机构
[1] Bogazici Univ, Dept Comp Engn, TR-34342 Istanbul, Turkey
[2] Bogazici Univ, Dept Elect & Elect Engn, TR-34342 Istanbul, Turkey
关键词
Anomaly detection; Malicious user detection; DDoS; Mahalanobis distances; Sequence alignment kernel; INTRUSION DETECTION;
D O I
10.1016/j.comnet.2018.02.025
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Distributed Denial of Services (DDoS) attacks are among the most encountered cyber criminal activities in communication networks that can result in considerable financial and prestige losses for the corporations or governmental organizations. Therefore, autonomous detection of a DDoS attack and identification of its sources is essential for taking counter-measures. This study proposes an intelligent security system against DDoS attacks in communication networks that is composed of two components: A monitor for detection of DDoS attacks and a discriminator for detection of users in the system with malicious intents. A novel adaptive real time change-point model that tracks the changes in Mahalanobis distances between sampled feature vectors in the monitored system accounts for possible DDoS attacks. A clustering model that runs over the similarity scores of behavioral patterns between the users is used to segregate the malicious from the innocent. The proposed model is deployed over a simulated telephone network that uses a Session Initiation Protocol (SIP) server. The performance of the models are evaluated on data generated by this high throughput simulation environment. (C) 2018 Elsevier B.V. All rights reserved.
引用
收藏
页码:137 / 154
页数:18
相关论文
共 43 条
  • [11] [Anonymous], DDOS ATTACKS TARGETI
  • [12] [Anonymous], 2010, P POW EN ENG C APPEE
  • [13] [Anonymous], P INT JOINT C NEUR N, DOI DOI 10.1109/IJCNN.2007.4371393
  • [14] Detection of DDoS attacks and flash events using novel information theory metrics
    Behal, Sunny
    Kumar, Krishan
    [J]. COMPUTER NETWORKS, 2017, 116 : 96 - 110
  • [15] Chen Eric Y., 2008, 2008 Second International Conference on Emerging Security Information, Systems and Technologies (SECUREWARE), P114, DOI 10.1109/SECURWARE.2008.11
  • [16] Chen HH, 2013, 19TH ACM SIGKDD INTERNATIONAL CONFERENCE ON KNOWLEDGE DISCOVERY AND DATA MINING (KDD'13), P392
  • [17] Cuturi M., 2011, P 28 INT C MACH LEAR, P929
  • [18] Cuturi M, 2007, INT CONF ACOUST SPEE, P413
  • [19] D'Alconzo A, 2009, GLOBECOM 2009 2009 I, P1
  • [20] Distribution-based anomaly detection in 3G mobile networks: from theory to practice
    D'Alconzo, Alessandro
    Coluccia, Angelo
    Romirer-Maierhofer, Peter
    [J]. INTERNATIONAL JOURNAL OF NETWORK MANAGEMENT, 2010, 20 (05) : 245 - 269