Skip to main content

2017 | OriginalPaper | Buchkapitel

Network Anomaly Detection Based on Probabilistic Analysis

verfasst von : JinSoo Park, Dong Hag Choi, You-Boo Jeon, Se Dong Min, Doo-Soon Park

Erschienen in: Advances in Computer Science and Ubiquitous Computing

Verlag: Springer Singapore

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

In this paper, we provide a detection technology for a common type of network intrusion (traffic flood attack) using an anomaly data detection method based on probabilistic model analysis. Victim’s computers under attack show various symptoms such as degradation of TCP throughput, increase of CPU usage, increase of RTT (Round Trip Time), frequent disconnection to the web sites, and etc. These symptoms can be used as components to comprise k-dimensional feature space of multivariate normal distribution where an anomaly detection method can be applied for the detection of the attack. These features are in general correlated one another. In other words, most of these symptoms are caused by the attack, so they are highly correlated. Thus we choose only a few of these features for the anomaly detection in multivariate normal distribution. We study this technology for those IoT networks prepared to provide u-health services in the future, where stable and consistent network connectivity is extremely important because the connectivity is highly related to the loss of human lives eventually.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Kolahi, S.S., Treseangrat, K., Sassafpour, B.: Analysis of UDP DDoS flood cyber attack and defense mechanisms on web server with Linux Ubuntu 13. In: 2015 International Conference on Communications, Signal Processing, and their Applications (ICCSPA), pp. 17–19, February 2015 Kolahi, S.S., Treseangrat, K., Sassafpour, B.: Analysis of UDP DDoS flood cyber attack and defense mechanisms on web server with Linux Ubuntu 13. In: 2015 International Conference on Communications, Signal Processing, and their Applications (ICCSPA), pp. 17–19, February 2015
2.
Zurück zum Zitat Bayarjargal, D., Cho, G.: Detecting an anomalous traffic attack area based on entropy distribution and mahalanobis distance. Int. J. Secur. Appl. 8(2), 87–94 (2014) Bayarjargal, D., Cho, G.: Detecting an anomalous traffic attack area based on entropy distribution and mahalanobis distance. Int. J. Secur. Appl. 8(2), 87–94 (2014)
3.
Zurück zum Zitat Rodgers, J.L., Nicewander, W.A.: Thirteen ways to look at the correlation coefficient. Am. Stat. 42(1), 59–66 (1988)CrossRef Rodgers, J.L., Nicewander, W.A.: Thirteen ways to look at the correlation coefficient. Am. Stat. 42(1), 59–66 (1988)CrossRef
4.
Zurück zum Zitat Kejie, L., Dapeng, W., Fan, J., Todorovic, S., Nucci, A.: Robust and efficient detection of DDoS attacks for large-scale internet. Comput. Netw. 51, 5036–5056 (2007)CrossRefMATH Kejie, L., Dapeng, W., Fan, J., Todorovic, S., Nucci, A.: Robust and efficient detection of DDoS attacks for large-scale internet. Comput. Netw. 51, 5036–5056 (2007)CrossRefMATH
5.
Zurück zum Zitat Weon, I.-Y., Song, D.-H., Ko, S.-B., Lee, C.-H.: A multiple instance learning problem approach model to anomaly network intrusion detection. Int. J. Inf. Process. Syst. 1(1), 14–21 (2005)CrossRef Weon, I.-Y., Song, D.-H., Ko, S.-B., Lee, C.-H.: A multiple instance learning problem approach model to anomaly network intrusion detection. Int. J. Inf. Process. Syst. 1(1), 14–21 (2005)CrossRef
Metadaten
Titel
Network Anomaly Detection Based on Probabilistic Analysis
verfasst von
JinSoo Park
Dong Hag Choi
You-Boo Jeon
Se Dong Min
Doo-Soon Park
Copyright-Jahr
2017
Verlag
Springer Singapore
DOI
https://doi.org/10.1007/978-981-10-3023-9_107

Neuer Inhalt