Skip to main content
Erschienen in: Automatic Control and Computer Sciences 8/2018

01.12.2018

Security Analysis Based on Controlling Dependences of Network Traffic Parameters by Wavelet Transformation

verfasst von: D. S. Lavrova, I. V. Alekseev, A. A. Shtyrkina

Erschienen in: Automatic Control and Computer Sciences | Ausgabe 8/2018

Einloggen, um Zugang zu erhalten

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract—

This article presents mathematical tools of wavelet transformations for use in detecting network traffic attacks. The technique consists in discrete wavelet transformation of parameters of network packets extracted from traffic and tracking the degree of dependence of various network traffic parameters using the multiple correlation coefficient. The efficiency of the proposed technique is shown in the results of experimental detections of SYN flood DoS attacks.
Literatur
1.
Zurück zum Zitat Sheluhin, O.I. and Atayero, A.A., Detection of DoS and DDoS attacks in information communication networks with discrete wavelet analysis, Int. J. Comput. Sci. Inf. Secur., 2012, vol. 10, no. 1, p. 53. Sheluhin, O.I. and Atayero, A.A., Detection of DoS and DDoS attacks in information communication networks with discrete wavelet analysis, Int. J. Comput. Sci. Inf. Secur., 2012, vol. 10, no. 1, p. 53.
2.
Zurück zum Zitat Loskutov, A.Yu., Time series analysis. Lecture course, Physical Faculty, Moscow State University. http://chaos.phys.msu.ru/ loskutov/PDF/Lectures_time_series_analysis.pdf. Accessed May 14, 2018. Loskutov, A.Yu., Time series analysis. Lecture course, Physical Faculty, Moscow State University. http://​chaos.​phys.​msu.​ru/​ loskutov/PDF/Lectures_time_series_analysis.pdf. Accessed May 14, 2018.
3.
Zurück zum Zitat Kim, S.S., Reddy, A.L.N., and Vannucci, M., Detecting traffic anomalies using discrete wavelet transform, Proceedings of the International Conference on Information Networking, 2004. Kim, S.S., Reddy, A.L.N., and Vannucci, M., Detecting traffic anomalies using discrete wavelet transform, Proceedings of the International Conference on Information Networking, 2004.
4.
Zurück zum Zitat Salagean, M. and Firoiu, I., Anomaly detection of network traffic based on Analytical Discrete Wavelet Transform, Proc. of ICC, 2010. Salagean, M. and Firoiu, I., Anomaly detection of network traffic based on Analytical Discrete Wavelet Transform, Proc. of ICC, 2010.
5.
Zurück zum Zitat Tishina, N.A., Dvorovoi, I.G., and Solov’ev, N.A., Intrusion detection based on wavelet analysis of network traffic, Vestn. Ufim. Gos. Aviats. Tekh. Univ., 2010, vol. 14, no. 5, pp. 188–194. Tishina, N.A., Dvorovoi, I.G., and Solov’ev, N.A., Intrusion detection based on wavelet analysis of network traffic, Vestn. Ufim. Gos. Aviats. Tekh. Univ., 2010, vol. 14, no. 5, pp. 188–194.
6.
Zurück zum Zitat Kwon, D.W., et al., Wavelet methods for the detection of anomalies and their application to network traffic analysis, Qual. Reliab. Eng. Int., 2006, vol. 22, no. 8, pp. 953–969.CrossRef Kwon, D.W., et al., Wavelet methods for the detection of anomalies and their application to network traffic analysis, Qual. Reliab. Eng. Int., 2006, vol. 22, no. 8, pp. 953–969.CrossRef
7.
Zurück zum Zitat Shelukhin, O.I. and Garmashev, A.V., Detection of anomalous emissions of telecommunication traffic using discrete wavelet analysis methods, Elektromagn. Volny Elektron. Sist., 2012, vol. 17, no. 2, pp. 15–26. Shelukhin, O.I. and Garmashev, A.V., Detection of anomalous emissions of telecommunication traffic using discrete wavelet analysis methods, Elektromagn. Volny Elektron. Sist., 2012, vol. 17, no. 2, pp. 15–26.
8.
Zurück zum Zitat Shelukhin, O.I. and Filinova, A.S., Comparative analysis of algorithms for detecting traffic anomalies using discrete wavelet analysis methods, T-Comm Telekomm. Transp., 2014, vol. 8, no. 9. Shelukhin, O.I. and Filinova, A.S., Comparative analysis of algorithms for detecting traffic anomalies using discrete wavelet analysis methods, T-Comm Telekomm. Transp., 2014, vol. 8, no. 9.
9.
Zurück zum Zitat Fatkieva, R.R., Atiskov, A.Yu., and Levonevskii, D.K., RF Patent 2 538 292, 2015. Fatkieva, R.R., Atiskov, A.Yu., and Levonevskii, D.K., RF Patent 2 538 292, 2015.
10.
Zurück zum Zitat Ishkhanyan, M.V., Osnovy matematicheskogo prognozirovaniya sotsial’no-ekonomicheskikh protsessov (Basics of Mathematical Forecasting of Socio-Economic Processes), Moscow: Mosk. Gos. Univ. Putei Soobshch. Imp. Nikolaya II, 2016. Ishkhanyan, M.V., Osnovy matematicheskogo prognozirovaniya sotsial’no-ekonomicheskikh protsessov (Basics of Mathematical Forecasting of Socio-Economic Processes), Moscow: Mosk. Gos. Univ. Putei Soobshch. Imp. Nikolaya II, 2016.
11.
Zurück zum Zitat DARPA Intrusion Detection Evaluation. Intrusion Detection Attacks Database. https://www.ll.mit.edu/ideval/data/1999/training/week2/index.html. DARPA Intrusion Detection Evaluation. Intrusion Detection Attacks Database. https://​www.​ll.​mit.​edu/​ideval/​data/​1999/​training/​week2/​index.​html.​
12.
Zurück zum Zitat Fatkieva, R.R., Development of attack detection metrics based on network traffic analysis, Vestn. Buryat. Gos. Univ., 2013, no. 9, pp. 81–86. Fatkieva, R.R., Development of attack detection metrics based on network traffic analysis, Vestn. Buryat. Gos. Univ., 2013, no. 9, pp. 81–86.
Metadaten
Titel
Security Analysis Based on Controlling Dependences of Network Traffic Parameters by Wavelet Transformation
verfasst von
D. S. Lavrova
I. V. Alekseev
A. A. Shtyrkina
Publikationsdatum
01.12.2018
Verlag
Pleiades Publishing
Erschienen in
Automatic Control and Computer Sciences / Ausgabe 8/2018
Print ISSN: 0146-4116
Elektronische ISSN: 1558-108X
DOI
https://doi.org/10.3103/S0146411618080187

Weitere Artikel der Ausgabe 8/2018

Automatic Control and Computer Sciences 8/2018 Zur Ausgabe

Neuer Inhalt