Anomaly Detection Based on LRD Behavior Analysis of Decomposed Control and Data Planes Network Traffic Using SOSS and FARIMA Models

被引:21
作者
AsSadhan, Basil [1 ,2 ]
Zeb, Khan [1 ,2 ]
Al-Muhtadi, Jalal [3 ,4 ]
Alshebeili, Saleh [1 ,5 ]
机构
[1] King Saud Univ, Dept Elect Engn, Coll Engn, Riyadh 11421, Saudi Arabia
[2] King Saud Univ, CoEIA, Riyadh 11421, Saudi Arabia
[3] King Saud Univ, CoEIA, Riyadh 11653, Saudi Arabia
[4] King Saud Univ, Dept Comp Sci, Coll Comp & Informat Sci, Riyadh 11653, Saudi Arabia
[5] King Saud Univ, KACST TIC RF & Photon E Soc RFTONICS, Riyadh 11421, Saudi Arabia
关键词
Anomaly detection; intrusion detection; Internet traffic; LRD; self-similarity; network traffic analysis; network security; control plane traffic; data plane traffic; SOSS model; FARIMA model; LONG-RANGE DEPENDENCE; SELF-SIMILARITY;
D O I
10.1109/ACCESS.2017.2689001
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The detection of anomalies in network traffic, such as low volume attacks and abnormalities, has become a pressing problem in today's large volume of Internet traffic. To this end, various anomaly detection techniques have been developed, including techniques based on long-range dependence (LRD) behavior estimation of network traffic. However, the existing LRD-based techniques analyze the aggregated WHOLE (control plus data) traffic, which might not be sufficient to detect short-duration and low-volume attacks and abnormalities in the traffic. This is because such anomalies might pass unnoticed in large volume of the normal background traffic. To address this issue, we propose a method that examines the LRD behavior of control and data planes traffic separately, which improves the detection efficacy. For LRD behavior analysis, the proposed method integrates the correlation structures of second-order self-similar and fractional autoregressive integrated moving average models. The performance of the proposed method is empirically evaluated and validated over a relatively recent real Internet traffic captured at King Saud University's network. The analysis and results demonstrate that the proposed method efficiently detects such low volume and short duration attacks and abnormalities in the traffic, which would not be detected by merely analyzing the aggregated WHOLE traffic without decomposing it into control and data planes traffic.
引用
收藏
页码:13501 / 13519
页数:19
相关论文
共 66 条
[1]   TCP Ack storm DoS attacks [J].
Abramov, Raz ;
Herzberg, Amir .
COMPUTERS & SECURITY, 2013, 33 :12-27
[2]  
[Anonymous], 2000, 6 EUN OP EUR SCH INN
[3]  
[Anonymous], SAUD INT INN C SIIC
[4]  
[Anonymous], IMW 02
[5]  
[Anonymous], INT J COMPUTING INFO
[6]  
[Anonymous], INT J SOC MAT ENG RE
[7]  
[Anonymous], 2016, CISC VIS NETW IND GL
[8]  
[Anonymous], FDN TRENDS STOCHASTI
[9]  
[Anonymous], SIGCOMM COMPUT COMMU
[10]  
[Anonymous], UNCSTOR0712