Mobile Agents for Detecting Network Attacks Using Timing Covert Channels

被引:0
作者
Bieniasz, Jedrzej [1 ]
Stepkowska, Monika [1 ]
Janicki, Artur [1 ]
Szczypiorski, Krzysztof [1 ]
机构
[1] Warsaw Univ Technol, Div Cybersecur, Inst Telecommun, Warsaw, Poland
关键词
network security; traffic analysis; anomaly detection; intrusion detection; steganography; multi-agent systems; SYSTEMS;
D O I
暂无
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
This article addresses the problem of network attacks using steganographic techniques based on the manipulation of time relationships between IP packets. In the study, an efficient method to detect such attacks is presented. The proposed algorithm is based on the Change Observation Theory, and employs two types of agents: base and flying ones. The agents observe the time parameters of the network traffic, using proposed meta-histograms and trained machine learning algorithms, in the node where they were installed. The results of experiments using various machine learning algorithm are presented and discussed. The study showed that the Random Forest and MLP classifiers achieved the best detection results, yielding an area under the ROC curve (AUC) above 0.85 for the evaluation data. We showed a proof-of-concept for an attack detection method that combined the classification algorithm, the proposed anomaly metrics and the mobile agents. We claim that due to a unique feature of self-regulation, realized by destroying unnecessary agents, the proposed method can establish a new type of multi-agent intrusion detection system that can be applied to a wider group of IT systems.
引用
收藏
页码:1109 / 1130
页数:22
相关论文
共 50 条
  • [31] Towards a Unified Model for the Analysis of Timing-based Covert Channels
    Shrestha, Pradhumna Lal
    Hempel, Michael
    Sharif, Hamid
    2014 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2014, : 816 - 820
  • [32] Intelligent Techniques for Detecting Network Attacks: Review and Research Directions
    Aljabri, Malak
    Aljameel, Sumayh S.
    Mohammad, Rami Mustafa A.
    Almotiri, Sultan H.
    Mirza, Samiha
    Anis, Fatima M.
    Aboulnour, Menna
    Alomari, Dorieh M.
    Alhamed, Dina H.
    Altamimi, Hanan S.
    SENSORS, 2021, 21 (21)
  • [33] Detecting network cyber-attacks using an integrated statistical approach
    Benamar Bouyeddou
    Fouzi Harrou
    Benamar Kadri
    Ying Sun
    Cluster Computing, 2021, 24 : 1435 - 1453
  • [34] Denial jamming attacks on wireless sensor network using sensitive agents
    Pintea, Camelia-M.
    Pop, Petrica C.
    Zelina, Ioana
    LOGIC JOURNAL OF THE IGPL, 2016, 24 (01) : 92 - 103
  • [35] Defending UAV Networks Against Covert Attacks Using Auxiliary Signal Injections
    Wang, Xianghua
    Tan, Chee Pin
    Wang, Youqing
    Wang, Xiangrong
    IEEE TRANSACTIONS ON AUTOMATION SCIENCE AND ENGINEERING, 2024,
  • [36] Detecting Network Attacks Based on Behavioral Commonalities
    Najafabadi, Maryam M.
    Khoshgoftaar, Taghi M.
    Napolitano, Amri
    INTERNATIONAL JOURNAL OF RELIABILITY QUALITY AND SAFETY ENGINEERING, 2016, 23 (01)
  • [37] Detecting Cybersecurity Attacks Using Different Network Features with LightGBM and XGBoost Learners
    Leevy, Joffrey L.
    Hancock, John
    Zuech, Richard
    Khoshgoftaar, Taghi M.
    2020 IEEE SECOND INTERNATIONAL CONFERENCE ON COGNITIVE MACHINE INTELLIGENCE (COGMI 2020), 2020, : 190 - 197
  • [38] A Case Study on the Detection of Hash Chain-based Covert Channels Using Heuristics and Machine Learning
    Schymiczek, Jeff
    Schmidbauer, Tobias
    Wendzel, Steffen
    19TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY, AND SECURITY, ARES 2024, 2024,
  • [39] Comprehensive analysis of MQTT 5.0 susceptibility to network covert channels
    Mileva, Aleksandra
    Velinov, Aleksandar
    Hartmann, Laura
    Wendzel, Steffen
    Mazurczyk, Wojciech
    COMPUTERS & SECURITY, 2021, 104
  • [40] VoIP network covert channels to enhance privacy and information sharing
    Saenger, Jens
    Mazurczyk, Wojciech
    Keller, Joerg
    Caviglione, Luca
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2020, 111 : 96 - 106