Skip to main content
Erschienen in: Mobile Networks and Applications 1/2023

06.06.2021

Methodology for Detecting Cyber Intrusions in e-Learning Systems during COVID-19 Pandemic

verfasst von: Ivan Cvitić, Dragan Peraković, Marko Periša, Anca D. Jurcut

Erschienen in: Mobile Networks and Applications | Ausgabe 1/2023

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

In the scenarios of specific conditions and crises such as the coronavirus pandemic, the availability of e-learning ecosystem elements is further highlighted. The growing importance for securing such an ecosystem can be seen from DDoS (Distributed Denial of Service) attacks on e-learning components of the Croatian e-learning system. The negative impact of the conducted attack is visible in numerous users who were prevented from participating in and implementing the planned teaching process. Network anomalies such as conducted DDoS attacks were identified as one of the crucial threats to the e-learning systems. In this paper, an overview of the network anomaly phenomenon was given and botnets’ role in generating DDoS attacks, especially IoT device impact. The paper analyzes the impact of the COVID-19 pandemic on the e-learning systems in Croatia. Based on the conclusions, a research methodology has been proposed to develop a cyber-threat detection model that considers the specifics of the application of e-learning systems in crisis, distinguishing flash crowd events from anomalies in the communication network. The proposed methodology includes establishing a theoretical basis on DDoS and flash crowd event traffic, defining a laboratory testbed setup for data acquisition, development of DDoS detection model, and testing the applicability of the developed model on the case study. The implementation of the proposed methodology can improve the quality of the teaching process through timely DDoS detection and it gives other socio-economic contributions such as developing a specific research domain, publicly available dataset of network traffic, and raising the cyber-security of the e-learning systems.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Weitere Produktempfehlungen anzeigen
Literatur
1.
Zurück zum Zitat Chaabouni N, Mosbah M, Zemmari A, Sauvignac C, Faruki P (2019) Network intrusion detection for IoT security based on learning techniques. IEEE Commun Surveys Tutor. 21(3):2671–2701CrossRef Chaabouni N, Mosbah M, Zemmari A, Sauvignac C, Faruki P (2019) Network intrusion detection for IoT security based on learning techniques. IEEE Commun Surveys Tutor. 21(3):2671–2701CrossRef
3.
Zurück zum Zitat Huu Phuoc Dai N, Kerti A, Rajnai Z (2016) E-learning security risks and its countermeasures. J Emerg Res Solut ICT 1(1):17–25CrossRef Huu Phuoc Dai N, Kerti A, Rajnai Z (2016) E-learning security risks and its countermeasures. J Emerg Res Solut ICT 1(1):17–25CrossRef
9.
Zurück zum Zitat Bhuyan MH, Bhattacharyya DK, Kalita JK (2014) Network anomaly detection: methods, systems and tools. IEEE Commun Surveys Tutorials 16(1):303–336CrossRef Bhuyan MH, Bhattacharyya DK, Kalita JK (2014) Network anomaly detection: methods, systems and tools. IEEE Commun Surveys Tutorials 16(1):303–336CrossRef
10.
Zurück zum Zitat Bhattacharyya DK, Kalita JK (2016) DDoS attacks: evolution, detection, prevention, reaction and tolerance. CRC Press, Boca RatonCrossRef Bhattacharyya DK, Kalita JK (2016) DDoS attacks: evolution, detection, prevention, reaction and tolerance. CRC Press, Boca RatonCrossRef
11.
Zurück zum Zitat Zeb K, AsSadhan B, Al-Muhtadi J, Alshebeili S (2016) Anomaly detection using Wavelet-based estimation of LRD in packet and byte count of control traffic. In: 2016 7th International Conference on Information and Communication Systems (ICICS). IEEE p. 316–21 Zeb K, AsSadhan B, Al-Muhtadi J, Alshebeili S (2016) Anomaly detection using Wavelet-based estimation of LRD in packet and byte count of control traffic. In: 2016 7th International Conference on Information and Communication Systems (ICICS). IEEE p. 316–21
12.
Zurück zum Zitat Xiang Y, Li K, Zhou W (2011) Low-rate DDoS attacks detection and traceback by using new information metrics. IEEE Trans Inf Forensics Secur 6(2):426–437CrossRef Xiang Y, Li K, Zhou W (2011) Low-rate DDoS attacks detection and traceback by using new information metrics. IEEE Trans Inf Forensics Secur 6(2):426–437CrossRef
13.
Zurück zum Zitat Zargar ST, Joshi J, Tipper D (2013) A survey of defense mechanisms against distributed denial of service (DDOS) flooding attacks. IEEE Commun Surveys Tutorials 15(4):2046–2069CrossRef Zargar ST, Joshi J, Tipper D (2013) A survey of defense mechanisms against distributed denial of service (DDOS) flooding attacks. IEEE Commun Surveys Tutorials 15(4):2046–2069CrossRef
16.
Zurück zum Zitat Peraković D, Periša M, Cvitić I, Husnjak S (2017) Model for detection and classification of DDoS traffic based on artificial neural network. Telfor Journal. 9(1) Peraković D, Periša M, Cvitić I, Husnjak S (2017) Model for detection and classification of DDoS traffic based on artificial neural network. Telfor Journal. 9(1)
17.
Zurück zum Zitat Ebner M, Schön S, Braun C, Ebner M, Grigoriadis Y, Haas M, et al. (2020) COVID-19 Epidemic as E-Learning Boost? Chronological Development and Effects at an Austrian University against the Background of the Concept of “E-Learning Readiness.” Future Internet 12(6):94. Available from https://www.mdpi.com/1999-5903/12/6/94 Ebner M, Schön S, Braun C, Ebner M, Grigoriadis Y, Haas M, et al. (2020) COVID-19 Epidemic as E-Learning Boost? Chronological Development and Effects at an Austrian University against the Background of the Concept of “E-Learning Readiness.” Future Internet 12(6):94. Available from https://​www.​mdpi.​com/​1999-5903/​12/​6/​94
19.
Zurück zum Zitat Adzovie DE, Jibril AB, Holm R, Nyieku IE (2020) E-Learning Resulting From Covid-19 Pandemic: A Conceptual Study From a Developing Country Perspective Daniel. In: 7th European Conference on Social Media ECSM. Academic Conferences and Publishing International Limited; 2020. p. 1689–99 Adzovie DE, Jibril AB, Holm R, Nyieku IE (2020) E-Learning Resulting From Covid-19 Pandemic: A Conceptual Study From a Developing Country Perspective Daniel. In: 7th European Conference on Social Media ECSM. Academic Conferences and Publishing International Limited; 2020. p. 1689–99
20.
Zurück zum Zitat Radha R, Mahalakshmi K, Kumar VS, Saravanakumar AR (2020) E-learning during lockdown of Covid-19 pandemic: a global perspective. Intl J Control Autom 13(4):1088–1099 Radha R, Mahalakshmi K, Kumar VS, Saravanakumar AR (2020) E-learning during lockdown of Covid-19 pandemic: a global perspective. Intl J Control Autom 13(4):1088–1099
22.
Zurück zum Zitat Hayward C, Madill A (2004) A survey of outlier detection methodologies. Artif Intell Rev 22(2):85–126CrossRef Hayward C, Madill A (2004) A survey of outlier detection methodologies. Artif Intell Rev 22(2):85–126CrossRef
23.
Zurück zum Zitat Jain AK, Gupta BB (2016) A novel approach to protect against phishing attacks at client side using auto-updated white-list. Eurasip Journal on Information Security. 2016(1) Jain AK, Gupta BB (2016) A novel approach to protect against phishing attacks at client side using auto-updated white-list. Eurasip Journal on Information Security. 2016(1)
24.
Zurück zum Zitat Chandola V, Banerjee A, Kumar V (2009) Anomaly detection. ACM Comput Surv 41(3):1–58CrossRef Chandola V, Banerjee A, Kumar V (2009) Anomaly detection. ACM Comput Surv 41(3):1–58CrossRef
25.
Zurück zum Zitat Bhattacharyya DK, Kalita JK (2014) Network anomaly detection: a machine learning perspective. CRC Press, Boca Raton Bhattacharyya DK, Kalita JK (2014) Network anomaly detection: a machine learning perspective. CRC Press, Boca Raton
27.
Zurück zum Zitat Baddar SHA, Merlo A, Migliardi M (2014) Anomaly detection in computer networks: A state-of-the-art review. Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications. (December) Baddar SHA, Merlo A, Migliardi M (2014) Anomaly detection in computer networks: A state-of-the-art review. Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications. (December)
29.
Zurück zum Zitat Difallah DE, Cudre-Mauroux P, McKenna SA (2013) Scalable anomaly detection for smart city infrastructure networks. IEEE Internet Comput 17(6):39–47CrossRef Difallah DE, Cudre-Mauroux P, McKenna SA (2013) Scalable anomaly detection for smart city infrastructure networks. IEEE Internet Comput 17(6):39–47CrossRef
31.
Zurück zum Zitat Gupta BB, Badve OP (2017) Taxonomy of DoS and DDoS attacks and desirable defense mechanism in a cloud computing environment. Neural Comput & Applic 28(12):3655–3682CrossRef Gupta BB, Badve OP (2017) Taxonomy of DoS and DDoS attacks and desirable defense mechanism in a cloud computing environment. Neural Comput & Applic 28(12):3655–3682CrossRef
32.
Zurück zum Zitat Tripathi N, Mehtre B (2013) DoS and DDos Attacks: Impact, Analysis and Countermeasures. In: Proceedings of National Conference on Advances in Computing, Networking and Security. p. 1–6 Tripathi N, Mehtre B (2013) DoS and DDos Attacks: Impact, Analysis and Countermeasures. In: Proceedings of National Conference on Advances in Computing, Networking and Security. p. 1–6
33.
Zurück zum Zitat Hussain A, Heidemann J, Papadopoulos C (2003) A Framework for Classifying Denial of Service Attacks. In: Applications technologies architectures and protocols for computer communications (SIGCOMM 03). New York, USA; p. 99–110 Hussain A, Heidemann J, Papadopoulos C (2003) A Framework for Classifying Denial of Service Attacks. In: Applications technologies architectures and protocols for computer communications (SIGCOMM 03). New York, USA; p. 99–110
34.
Zurück zum Zitat Cvitić I. (2020) Network traffic anomaly detection based on traffic characteristics and device class affiliation. Doctoral thesis University of Zagreb Cvitić I. (2020) Network traffic anomaly detection based on traffic characteristics and device class affiliation. Doctoral thesis University of Zagreb
36.
Zurück zum Zitat Douligeris C, Mitrokotsa A (2004) DDoS attacks and defense mechanisms: classification and state-of-the-art. Comput Netw 44(5):643–666CrossRef Douligeris C, Mitrokotsa A (2004) DDoS attacks and defense mechanisms: classification and state-of-the-art. Comput Netw 44(5):643–666CrossRef
37.
Zurück zum Zitat Hallman R, Bryan J, Palavicini G, Divita J, Romero-Mariona J (2017) IoDDoS — The Internet of Distributed Denial of Sevice Attacks - A Case Study of the Mirai Malware and IoT-Based Botnets. In: Proceedings of the 2nd International Conference on Internet of Things, Big Data and Security. p. 47–58 Hallman R, Bryan J, Palavicini G, Divita J, Romero-Mariona J (2017) IoDDoS — The Internet of Distributed Denial of Sevice Attacks - A Case Study of the Mirai Malware and IoT-Based Botnets. In: Proceedings of the 2nd International Conference on Internet of Things, Big Data and Security. p. 47–58
38.
Zurück zum Zitat Adat V, Gupta BB (2018) Security in internet of things: issues, challenges, taxonomy, and architecture. Telecommun Syst 67(3):423–441CrossRef Adat V, Gupta BB (2018) Security in internet of things: issues, challenges, taxonomy, and architecture. Telecommun Syst 67(3):423–441CrossRef
39.
Zurück zum Zitat Stergiou C, Psannis KE, Gupta BB, Ishibashi Y (2018) Security, privacy & efficiency of sustainable cloud computing for big data & IoT. Sustain Comput Inform Syst 19:174–184 Stergiou C, Psannis KE, Gupta BB, Ishibashi Y (2018) Security, privacy & efficiency of sustainable cloud computing for big data & IoT. Sustain Comput Inform Syst 19:174–184
41.
Zurück zum Zitat Tewari A, Gupta BB (2020) Security, privacy and trust of different layers in internet-of-things (IoTs) framework. Futur Gener Comput Syst 108:909–920CrossRef Tewari A, Gupta BB (2020) Security, privacy and trust of different layers in internet-of-things (IoTs) framework. Futur Gener Comput Syst 108:909–920CrossRef
46.
Zurück zum Zitat De Donno M, Dragoni N, Giaretta A, Spognardi A (2018) DDoS-capable IoT malwares: comparative analysis and Mirai investigation. Secur Commun Netw 2018:1–30CrossRef De Donno M, Dragoni N, Giaretta A, Spognardi A (2018) DDoS-capable IoT malwares: comparative analysis and Mirai investigation. Secur Commun Netw 2018:1–30CrossRef
47.
Zurück zum Zitat Vlajic N, Zhou D (2018) IoT as a land of opportunity for DDoS hackers. Computer. 51(7):26–34CrossRef Vlajic N, Zhou D (2018) IoT as a land of opportunity for DDoS hackers. Computer. 51(7):26–34CrossRef
48.
Zurück zum Zitat Bertino E, Islam N (2017) Botnets and internet of things security. Computer. 50(2):76–79CrossRef Bertino E, Islam N (2017) Botnets and internet of things security. Computer. 50(2):76–79CrossRef
49.
Zurück zum Zitat Spognardi A, Donno M De, Dragoni N, Giaretta A (2017) Analysis of DDoS-Capable IoT Malwares. Proceedings of the 2017 Federated Conference on Computer Science and Information Systems. 11(September):807–16 Spognardi A, Donno M De, Dragoni N, Giaretta A (2017) Analysis of DDoS-Capable IoT Malwares. Proceedings of the 2017 Federated Conference on Computer Science and Information Systems. 11(September):807–16
51.
Zurück zum Zitat Behal S, Kumar K, Sachdeva M (2017) Discriminating flash events from DDoS attacks: a comprehensive review. Intl J Netw Secur 19(5):734–741 Behal S, Kumar K, Sachdeva M (2017) Discriminating flash events from DDoS attacks: a comprehensive review. Intl J Netw Secur 19(5):734–741
52.
Zurück zum Zitat Yu S, Zhou W, Jia W, Guo S, Xiang Y, Tang F (2012) Discriminating DDoS attacks from flash crowds using flow correlation coefficient. IEEE Trans Parallel Distrib Syst 23(6):1073–1080CrossRef Yu S, Zhou W, Jia W, Guo S, Xiang Y, Tang F (2012) Discriminating DDoS attacks from flash crowds using flow correlation coefficient. IEEE Trans Parallel Distrib Syst 23(6):1073–1080CrossRef
54.
Zurück zum Zitat Cvitić I, Peraković D, Periša M, Jurcut AD (2020) Methodology proposal for proactive detection of network anomalies in e-learning system during the COVID-19 scenario. In: Proceedings of 5th EAI International Conference on Management of Manufacturing Systems (in print) Cvitić I, Peraković D, Periša M, Jurcut AD (2020) Methodology proposal for proactive detection of network anomalies in e-learning system during the COVID-19 scenario. In: Proceedings of 5th EAI International Conference on Management of Manufacturing Systems (in print)
Metadaten
Titel
Methodology for Detecting Cyber Intrusions in e-Learning Systems during COVID-19 Pandemic
verfasst von
Ivan Cvitić
Dragan Peraković
Marko Periša
Anca D. Jurcut
Publikationsdatum
06.06.2021
Verlag
Springer US
Erschienen in
Mobile Networks and Applications / Ausgabe 1/2023
Print ISSN: 1383-469X
Elektronische ISSN: 1572-8153
DOI
https://doi.org/10.1007/s11036-021-01789-3

Weitere Artikel der Ausgabe 1/2023

Mobile Networks and Applications 1/2023 Zur Ausgabe