Skip to main content
Erschienen in: Automatic Control and Computer Sciences 5/2018

01.09.2018

Network Traffic Anomalies Detection Using a Fixing Method of Multifractal Dimension Jumps in a Real-Time Mode

verfasst von: O. I. Sheluhin, I. Yu. Lukin

Erschienen in: Automatic Control and Computer Sciences | Ausgabe 5/2018

Einloggen, um Zugang zu erhalten

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

This article considers the possibility of detecting traffic anomalies on the basis of multiscale, multifractal analysis by monitoring fractal-dimensional jumps in real time. The method is based on the current estimation of multifractal properties of traffic using a sliding window and multiscale wavelet analysis. The numerical results allow us to conclude that fixing the jumplike change in the fractal dimension for various components of the multifractal spectrum makes it possible to pinpoint the presence of an anomaly with significant accuracy. In practice, the estimation of these multifractality components in this spectrum can be achieved by constructing a multichannel algorithm, each channel of which is oriented with the corresponding component of the multifractal spectrum.
Literatur
1.
Zurück zum Zitat Luo, X., Chan, E.W.W., and Chang, R.K.C., Vanguard: A new detection scheme for a class of TCP targeted denial-of-service attacks, EURASIP J. Adv. Signal Process., 2009, vol. 2009. Luo, X., Chan, E.W.W., and Chang, R.K.C., Vanguard: A new detection scheme for a class of TCP targeted denial-of-service attacks, EURASIP J. Adv. Signal Process., 2009, vol. 2009.
2.
Zurück zum Zitat Lu, L.F., Huang, M.L., Orgun, M.A., and Zhang, J.W., An improved wavelet analysis method for detecting DDoS attacks, 4th International Conference on Network and System Security, 2011, pp. 318–322. Lu, L.F., Huang, M.L., Orgun, M.A., and Zhang, J.W., An improved wavelet analysis method for detecting DDoS attacks, 4th International Conference on Network and System Security, 2011, pp. 318–322.
3.
Zurück zum Zitat Chandola, V., Banerjee, A., and Kumar, V., Anomaly detection for discrete sequences: A survey, IEEE Trans. Knowl. Data Eng., 2012, vol. 24, no. 5. Chandola, V., Banerjee, A., and Kumar, V., Anomaly detection for discrete sequences: A survey, IEEE Trans. Knowl. Data Eng., 2012, vol. 24, no. 5.
4.
Zurück zum Zitat Mohiuddin, A., Abdun Naser, M., and Jiankun, H., A survey of network anomaly detection techniques, J. Network Comput. Appl., 2015, no. 60, p. 21. Mohiuddin, A., Abdun Naser, M., and Jiankun, H., A survey of network anomaly detection techniques, J. Network Comput. Appl., 2015, no. 60, p. 21.
5.
Zurück zum Zitat Bhuyan, M.H., Bhattacharyya, D.K., and Kalita, J.K., Network anomaly detection: Methods, systems and tools, IEEE Commun. Surv. Tutorials, 2013, vol. 60, no. 1, pp. 303–336. Bhuyan, M.H., Bhattacharyya, D.K., and Kalita, J.K., Network anomaly detection: Methods, systems and tools, IEEE Commun. Surv. Tutorials, 2013, vol. 60, no. 1, pp. 303–336.
6.
Zurück zum Zitat Abry, P. and Veitch, D., Wavelet analysis of long-range dependent traffic, IEEE Trans. Inf. Theory, 1998, vol. 44, no. 1, pp. 2–15.MathSciNetCrossRefMATH Abry, P. and Veitch, D., Wavelet analysis of long-range dependent traffic, IEEE Trans. Inf. Theory, 1998, vol. 44, no. 1, pp. 2–15.MathSciNetCrossRefMATH
7.
Zurück zum Zitat Abry, P., Taqqu, M.S., Flandrin, P., and Veitch, D., Wavelets for the analysis, estimation, and synthesis of scaling data, in Self -Similar Network Traffic and Performance Evaluation, Park, K. and Willinger, W., Eds., John Wiley & Sons, 2000, pp. 39–88. Abry, P., Taqqu, M.S., Flandrin, P., and Veitch, D., Wavelets for the analysis, estimation, and synthesis of scaling data, in Self -Similar Network Traffic and Performance Evaluation, Park, K. and Willinger, W., Eds., John Wiley & Sons, 2000, pp. 39–88.
8.
Zurück zum Zitat Zhengmin, X., Songnian, L., and Junhua, T., Note on studying change point of LRD traffic based on Li’s detection of DDoS flood attacking, Math. Probl. Eng., 2010, vol. 2010. Zhengmin, X., Songnian, L., and Junhua, T., Note on studying change point of LRD traffic based on Li’s detection of DDoS flood attacking, Math. Probl. Eng., 2010, vol. 2010.
9.
Zurück zum Zitat Gagandeep Kaur, Vikas Saxena, and Jay Prakash, Study of self-similarity for detection of rate-based network anomalies, Int. J. Secur. Its Appl., 2017, vol. 11, no. 8, pp. 27–44. Gagandeep Kaur, Vikas Saxena, and Jay Prakash, Study of self-similarity for detection of rate-based network anomalies, Int. J. Secur. Its Appl., 2017, vol. 11, no. 8, pp. 27–44.
10.
Zurück zum Zitat Sheng, Z., Qifei, P., Xuezeng, P., and Xuhui, Z., Detection of low-rate DDoS attack based on self similarity, 2010 Second International Workshop on Education Technology and Computer Science, 2010, vol. 1, pp. 333–336. Sheng, Z., Qifei, P., Xuezeng, P., and Xuhui, Z., Detection of low-rate DDoS attack based on self similarity, 2010 Second International Workshop on Education Technology and Computer Science, 2010, vol. 1, pp. 333–336.
11.
Zurück zum Zitat Kettani, H. and Gubner, J.A., A novel approach to the estimation of the Hurst parameter in self-similar traffic, Proceedings of the 27th Annual IEEE Conference on Local Computer Networks, Tampa, 2002, pp. 160–165. Kettani, H. and Gubner, J.A., A novel approach to the estimation of the Hurst parameter in self-similar traffic, Proceedings of the 27th Annual IEEE Conference on Local Computer Networks, Tampa, 2002, pp. 160–165.
12.
Zurück zum Zitat Cheng, X., Xie, K., and Wang, D., Network traffic anomaly detection based on self-similarity using HHT and wavelet transform, Proceedings of the 5th International Conference on Information Assurance and Security, Xian, 2009, pp. 710–713. doi 10.1109/IAS.2009.21910.1109/IAS.2009.219 Cheng, X., Xie, K., and Wang, D., Network traffic anomaly detection based on self-similarity using HHT and wavelet transform, Proceedings of the 5th International Conference on Information Assurance and Security, Xian, 2009, pp. 710–713. doi 10.1109/IAS.2009.21910.1109/IAS.2009.219
13.
Zurück zum Zitat Wang, X. and Fang, B.X., An exploratory development on the Hurst parameter variety of network traffic abnormity signal, J. Harbin Inst. Technol., 2005, vol. 37, pp. 1046–1049. Wang, X. and Fang, B.X., An exploratory development on the Hurst parameter variety of network traffic abnormity signal, J. Harbin Inst. Technol., 2005, vol. 37, pp. 1046–1049.
14.
Zurück zum Zitat Atayero, A.A. and Sheluhin, O.I., Integrated Model for Information Communication Systems and Networks. Design and Development, IGI Global, 2013.CrossRef Atayero, A.A. and Sheluhin, O.I., Integrated Model for Information Communication Systems and Networks. Design and Development, IGI Global, 2013.CrossRef
15.
Zurück zum Zitat Sheluhin, O.I., Multifractals. Information Applications, Moscow: Hotline—Telecom, 2011. Sheluhin, O.I., Multifractals. Information Applications, Moscow: Hotline—Telecom, 2011.
16.
Zurück zum Zitat Mallat, S., A Wavelet Tour of Signal Processing, Academic Press, 1998.MATH Mallat, S., A Wavelet Tour of Signal Processing, Academic Press, 1998.MATH
17.
Zurück zum Zitat An Introduction to R. https://cran.r-project.org/doc/manuals/r-release/R-intro.html. Accessed July 6, 2018. An Introduction to R. https://​cran.​r-project.​org/​doc/​manuals/​r-release/​R-intro.​html.​ Accessed July 6, 2018.
Metadaten
Titel
Network Traffic Anomalies Detection Using a Fixing Method of Multifractal Dimension Jumps in a Real-Time Mode
verfasst von
O. I. Sheluhin
I. Yu. Lukin
Publikationsdatum
01.09.2018
Verlag
Pleiades Publishing
Erschienen in
Automatic Control and Computer Sciences / Ausgabe 5/2018
Print ISSN: 0146-4116
Elektronische ISSN: 1558-108X
DOI
https://doi.org/10.3103/S0146411618050115

Weitere Artikel der Ausgabe 5/2018

Automatic Control and Computer Sciences 5/2018 Zur Ausgabe

Neuer Inhalt