Detecting network attacks in the Internet via statistical network traffic normality prediction

被引:27
作者
Jiang J. [1 ]
Papavassiliou S. [1 ]
机构
[1] New Jersey Ctr. Wireless N./I.S., Electrical Engineering Department, New Jersey Institute of Technology, Newark
关键词
Anomaly-Tolerance; Dynamic Threshold; Intrusion Detection; Network Anomalies;
D O I
10.1023/B:JONS.0000015698.32353.61
中图分类号
学科分类号
摘要
The information technology advances that provide new capabilities to the network users and providers, also provide powerful new tools for network intruders that intend to launch attacks on critical information resources. In this paper we present a novel network attack diagnostic methodology, based on the characterization of the dynamic statistical properties of normal network traffic. The ability to detect network anomalies and attacks as unacceptable when significant deviations from the expected behavior occurs. Specifically, to provide an accurate identification of the normal network traffic behavior, we first develop an anomaly-tolerant nonstationary traffic prediction technique that is capable of removing both single pulse and continuous anomalies. Furthermore, we introduce and design dynamic thresholds, where we define adaptive anomaly violation conditions as a combined function of both magnitude and duration of the traffic deviations. Finally numerical results are presented that demonstrate the operational effectiveness and efficiency of the proposed approach under the presence of different attacks, such as mail-bombing attacks and UDP flooding attacks.
引用
收藏
页码:51 / 72
页数:21
相关论文
共 21 条
[1]  
Zou L., Haas Z., Securing ad hoc networks, IEEE Network, pp. 24-30, (1999)
[2]  
Zalenski R., Firewall technologies, IEEE Potentials, 21, pp. 24-29, (2002)
[3]  
Buschkes R., Kesdogan D., Reichl P., How to increase security in mobile networks by anomaly detection, Proceedings of the 14th Annual IEEE Computer Security Applications Conference, pp. 3-12, (1998)
[4]  
Lee W., Xiang D., Information-theoretic measures for anomaly detection, Proc. IEEE Symposium on Security and Privacy (S&P 2001), pp. 130-143, (2001)
[5]  
Platt J., A resource-allocating network for function interpolation, Neural Computation, 3, pp. 213-225, (1991)
[6]  
Chakrabarti A., Manimaran G., Internet infrastructure security: A taxonomy, IEEE Network, 16, 6, pp. 13-21, (2002)
[7]  
Chang R.K.C., Defending against flooding-based distributed denial-of-service attacks: A tutorial, IEEE Communications Magazine, 40, 10, pp. 42-51, (2002)
[8]  
Monin A.S., Weather Forecasting as a Problem in Physics, (1972)
[9]  
Dutta M., Economics, Econometrics and the Links, (1995)
[10]  
Kinsner W., Fractal and chaos engineering, Lecture Notes, (1994)