Mobile Agents for Detecting Network Attacks Using Timing Covert Channels

被引:0
作者
Bieniasz, Jedrzej [1 ]
Stepkowska, Monika [1 ]
Janicki, Artur [1 ]
Szczypiorski, Krzysztof [1 ]
机构
[1] Warsaw Univ Technol, Div Cybersecur, Inst Telecommun, Warsaw, Poland
关键词
network security; traffic analysis; anomaly detection; intrusion detection; steganography; multi-agent systems; SYSTEMS;
D O I
暂无
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
This article addresses the problem of network attacks using steganographic techniques based on the manipulation of time relationships between IP packets. In the study, an efficient method to detect such attacks is presented. The proposed algorithm is based on the Change Observation Theory, and employs two types of agents: base and flying ones. The agents observe the time parameters of the network traffic, using proposed meta-histograms and trained machine learning algorithms, in the node where they were installed. The results of experiments using various machine learning algorithm are presented and discussed. The study showed that the Random Forest and MLP classifiers achieved the best detection results, yielding an area under the ROC curve (AUC) above 0.85 for the evaluation data. We showed a proof-of-concept for an attack detection method that combined the classification algorithm, the proposed anomaly metrics and the mobile agents. We claim that due to a unique feature of self-regulation, realized by destroying unnecessary agents, the proposed method can establish a new type of multi-agent intrusion detection system that can be applied to a wider group of IT systems.
引用
收藏
页码:1109 / 1130
页数:22
相关论文
共 50 条
  • [41] SoK: A Survey Of Indirect Network-level Covert Channels
    Schmidbauer, Tobias
    Wendzel, Steffen
    ASIA CCS'22: PROCEEDINGS OF THE 2022 ACM ASIA CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2022, : 546 - 560
  • [42] Efficient distributed network covert channels for Internet of things environments
    Cabaj, Krzysztof
    Zorawski, Piotr
    Nowakowski, Piotr
    Purski, Maciej
    Mazurczyk, Wojciech
    JOURNAL OF CYBERSECURITY, 2020, 6 (01):
  • [43] Detecting Anomalies in Firewall Logs using Artificially Generated Attacks
    Komadina, Adrian
    Kovacevic, Ivan
    Stengl, Bruno
    Gros, Stjepan
    2023 17TH INTERNATIONAL CONFERENCE ON TELECOMMUNICATIONS, CONTEL, 2023,
  • [44] Detecting Denial-of-Service attacks using the wavelet transform
    Hamdi, Mohamed
    Boudriga, Noureddine
    COMPUTER COMMUNICATIONS, 2007, 30 (16) : 3203 - 3213
  • [45] Detecting new forms of network intrusion using genetic programming
    Lu, W
    Traore, I
    COMPUTATIONAL INTELLIGENCE, 2004, 20 (03) : 475 - 494
  • [46] A Novel Visualization Method for Detecting DDoS Network Attacks
    Zhang, Jiawan
    Yang, Guoqiang
    Lu, Liangfu
    Huang, MaoLin
    Che, Ming
    VISUAL INFORMATION COMMUNICATION, 2010, : 185 - +
  • [47] Detecting LDoS Attacks based on Abnormal Network Traffic
    Chen, Kai
    Liu, HuiYu
    Chen, XiaoSu
    KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2012, 6 (07): : 1831 - 1853
  • [48] Network Attacks Detection Using Fuzzy Logic
    Levonevskiy, D. K.
    Fatkieva, R. R.
    Ryzhkov, S. R.
    2015 XVIII International Conference on Soft Computing and Measurements (SCM), 2015, : 243 - 244
  • [49] Detecting Unknown Attacks in Wireless Sensor Networks That Contain Mobile Nodes
    Bankovic, Zorana
    Fraga, David
    Moya, Jose M.
    Carlos Vallejo, Juan
    SENSORS, 2012, 12 (08) : 10834 - 10850
  • [50] Detecting network attacks in the Internet via statistical network traffic normality prediction
    Jiang J.
    Papavassiliou S.
    Journal of Network and Systems Management, 2004, 12 (1) : 51 - 72