Mobile Agents for Detecting Network Attacks Using Timing Covert Channels

被引:0
|
作者
Bieniasz, Jedrzej [1 ]
Stepkowska, Monika [1 ]
Janicki, Artur [1 ]
Szczypiorski, Krzysztof [1 ]
机构
[1] Warsaw Univ Technol, Div Cybersecur, Inst Telecommun, Warsaw, Poland
关键词
network security; traffic analysis; anomaly detection; intrusion detection; steganography; multi-agent systems; SYSTEMS;
D O I
暂无
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
This article addresses the problem of network attacks using steganographic techniques based on the manipulation of time relationships between IP packets. In the study, an efficient method to detect such attacks is presented. The proposed algorithm is based on the Change Observation Theory, and employs two types of agents: base and flying ones. The agents observe the time parameters of the network traffic, using proposed meta-histograms and trained machine learning algorithms, in the node where they were installed. The results of experiments using various machine learning algorithm are presented and discussed. The study showed that the Random Forest and MLP classifiers achieved the best detection results, yielding an area under the ROC curve (AUC) above 0.85 for the evaluation data. We showed a proof-of-concept for an attack detection method that combined the classification algorithm, the proposed anomaly metrics and the mobile agents. We claim that due to a unique feature of self-regulation, realized by destroying unnecessary agents, the proposed method can establish a new type of multi-agent intrusion detection system that can be applied to a wider group of IT systems.
引用
收藏
页码:1109 / 1130
页数:22
相关论文
共 50 条
  • [21] Implementing a passive network covert timing channel
    Zi, Xiaochao
    Yao, Lihong
    Pan, Li
    Li, Jianhua
    COMPUTERS & SECURITY, 2010, 29 (06) : 686 - 696
  • [22] Covert Channels-Based Stealth Attacks in Industry 4.0
    Alcaraz, Cristina
    Bernieri, Giuseppe
    Pascucci, Federica
    Lopez, Javier
    Setola, Roberto
    IEEE SYSTEMS JOURNAL, 2019, 13 (04): : 3980 - 3988
  • [23] Detecting Cyber and Physical Attacks Against Mobile Robots Using Machine Learning: An Empirical Study
    Nyusti, Levente
    Chockalingam, Sabarathinam
    Bours, Patrick
    Bodal, Terje
    SECURE IT SYSTEMS, NORDSEC 2024, 2025, 15396 : 139 - 157
  • [24] Detecting Network Attacks using Federated Learning for IoT Devices
    Shahid, Osama
    Mothukuri, Viraaji
    Pouriyeh, Seyedamin
    Parizi, Reza M.
    Shahriar, Hossain
    2021 IEEE 29TH INTERNATIONAL CONFERENCE ON NETWORK PROTOCOLS (ICNP 2021), 2021,
  • [25] COVERT TIMING CHANNELS CODES FOR COMMUNICATION OVER INTERACTIVE TRAFFIC
    Kiyavash, Negar
    Coleman, Todd
    2009 IEEE INTERNATIONAL CONFERENCE ON ACOUSTICS, SPEECH, AND SIGNAL PROCESSING, VOLS 1- 8, PROCEEDINGS, 2009, : 1485 - +
  • [26] Distributed Intrusion Detection using Mobile Agents against DDoS Attacks
    Akyazi, Ugur
    Uyar, A. Sima Etaner
    23RD INTERNATIONAL SYMPOSIUM ON COMPUTER AND INFORMATION SCIENCES, 2008, : 346 - +
  • [27] Protocol-independent Detection of "Messaging Ordering" Network Covert Channels
    Wendzel, Steffen
    14TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY (ARES 2019), 2019,
  • [28] Detecting Web Attacks From HTTP Weblogs Using Variational LSTM Autoencoder Deviation Network
    Jagat, Rikhi Ram
    Sisodia, Dilip Singh
    Singh, Pradeep
    IEEE TRANSACTIONS ON SERVICES COMPUTING, 2024, 17 (05) : 2210 - 2222
  • [29] Architectures for Detecting Interleaved Multi-Stage Network Attacks Using Hidden Markov Models
    Shawly, Tawfeeq
    Elghariani, Ali
    Kobes, Jason
    Ghafoor, Arif
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2021, 18 (05) : 2316 - 2330
  • [30] FlowHacker: Detecting Unknown Network Attacks in Big Traffic Data using Network Flows
    Sacramento, Luis
    Medeiros, Iberia
    Bota, Joao
    Correial, Miguel
    2018 17TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (IEEE TRUSTCOM) / 12TH IEEE INTERNATIONAL CONFERENCE ON BIG DATA SCIENCE AND ENGINEERING (IEEE BIGDATASE), 2018, : 567 - 572