An intelligent cyber security system against DDoS attacks in SIP networks

被引:32
作者
Semerci, Murat [1 ]
Cemgil, Ali Taylan [1 ]
Sankur, Bulent [2 ]
机构
[1] Bogazici Univ, Dept Comp Engn, TR-34342 Istanbul, Turkey
[2] Bogazici Univ, Dept Elect & Elect Engn, TR-34342 Istanbul, Turkey
关键词
Anomaly detection; Malicious user detection; DDoS; Mahalanobis distances; Sequence alignment kernel; INTRUSION DETECTION;
D O I
10.1016/j.comnet.2018.02.025
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Distributed Denial of Services (DDoS) attacks are among the most encountered cyber criminal activities in communication networks that can result in considerable financial and prestige losses for the corporations or governmental organizations. Therefore, autonomous detection of a DDoS attack and identification of its sources is essential for taking counter-measures. This study proposes an intelligent security system against DDoS attacks in communication networks that is composed of two components: A monitor for detection of DDoS attacks and a discriminator for detection of users in the system with malicious intents. A novel adaptive real time change-point model that tracks the changes in Mahalanobis distances between sampled feature vectors in the monitored system accounts for possible DDoS attacks. A clustering model that runs over the similarity scores of behavioral patterns between the users is used to segregate the malicious from the innocent. The proposed model is deployed over a simulated telephone network that uses a Session Initiation Protocol (SIP) server. The performance of the models are evaluated on data generated by this high throughput simulation environment. (C) 2018 Elsevier B.V. All rights reserved.
引用
收藏
页码:137 / 154
页数:18
相关论文
共 43 条
  • [21] D'Antonio S, 2006, ANN TELECOMMUN, V61, P1136, DOI 10.1007/BF03219885
  • [22] Davis J.V., 2007, P 24 INT C MACHINE L, P209, DOI DOI 10.1145/1273496.1273523
  • [23] Survey of network security systems to counter SIP-based denial-of-service attacks
    Ehlert, Sven
    Geneiatakis, Dimitris
    Magedanz, Thomas
    [J]. COMPUTERS & SECURITY, 2010, 29 (02) : 225 - 243
  • [24] Anomaly-based network intrusion detection: Techniques, systems and challenges
    Garcia-Teodoro, P.
    Diaz-Verdejo, J.
    Macia-Fernandez, G.
    Vazquez, E.
    [J]. COMPUTERS & SECURITY, 2009, 28 (1-2) : 18 - 28
  • [25] A survey on smart power grid: frameworks, tools, security issues, and solutions
    Gupta, B. B.
    Akhtar, Tafseer
    [J]. ANNALS OF TELECOMMUNICATIONS, 2017, 72 (9-10) : 517 - 549
  • [26] Outlier Detection for Temporal Data: A Survey
    Gupta, Manish
    Gao, Jing
    Aggarwal, Charu C.
    Han, Jiawei
    [J]. IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, 2014, 26 (09) : 2250 - 2267
  • [27] Large-Scale Unusual Time Series Detection
    Hyndman, Rob J.
    Wang, Earo
    Laptev, Nikolay
    [J]. 2015 IEEE INTERNATIONAL CONFERENCE ON DATA MINING WORKSHOP (ICDMW), 2015, : 1616 - 1619
  • [28] Joon Heo, 2010, 2010 10th International Symposium on Communications and Information Technologies (ISCIT 2010), P1223, DOI 10.1109/ISCIT.2010.5665175
  • [29] A Comprehensive Survey of Voice over IP Security Research
    Keromytis, Angelos D.
    [J]. IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2012, 14 (02): : 514 - 537
  • [30] Structural analysis and detection of android botnets using machine learning techniques
    Kirubavathi, G.
    Anitha, R.
    [J]. INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2018, 17 (02) : 153 - 167