An approach to detecting anomalies in a self-similar network traffic

Author:

Veselova V. A.1,Kolomoytsev V. S.1

Affiliation:

1. Saint Petersburg State University of Aerospace Instrumentation

Abstract

Aim. The effects of cyber attacks cause failures of network elements, theft of information and other unlawful actions. Cyber attacks are often accompanied by untypical traffic activity and anomalies. The paper aims to develop an approach to detecting anomalies in network traffic by identifying the degree of self-similarity of the traffic using fractal analysis and statistical methods. Methods. The paper uses methods of mathematical statistics, mathematical analysis, fractal analysis. Results. The paper suggests an approach to identifying anomalies in network traffic by evaluating self-similarity and using statistical methods for improving the accuracy of cyber attack detection. At the first stage, the Hurst exponent is calculated for the reference traffic. At the second stage, actual traffic is divided into optimal time intervals; for each interval, the Hurst exponent is calculated. If the identified value of the Hurst exponent differs from the one obtained for the reference traffic, it is decided that there is an anomaly. At the final stage, statistical analysis is used in order to precisely localise the anomaly. The authors analysed fractal and statistical methods that resulted in the identification of more efficient methods to be used as part of the proposed approach. For fractal analysis, the DFA method was proposed, while for statistical analysis, the ARFIMA method was proposed. Conclusion. The suggested approach allows identifying cyber attacks in real time or near-real time.

Publisher

Journal Dependability

Subject

General Medicine

Reference18 articles.

1. Perov R.A., Lauta O.S., Kribel A.M., Fedulov Yu.V. Complex method for detecting cyber attacks based on integration of fractal analysis and statistical methods. High Tech in Earth Space Research 2022;2:44-51. DOI: 10.36724/2409-5419-2022-14-2-44-51. (in Russ.)

2. Uskov E.D., Korepanova N.L. [Analysis of informative features of network traffic anomalies in corporate networks]. Modern innovations 2019;3(31):13-16. (in Russ.)

3. Suvorov A.O., Suvorova V.A. [Data mining of network traffic for identifying computer intrusions]. Iskusstvenniy Intellekt i Prinyatie Resheniy 2019;1:62-73. DOI: 10.14357/20718594190106. (in Russ.)

4. Barsukov I.S., Riapolov M.P., Bobreshov A.M. [An algorithm for analysing fractal properties of traffic for detecting network anomalies]. [Radar location, navigation, communication: Proceedings of the XXVI International Science and Engineering Conference] 2020;4:302-311. (in Russ.)

5. Barsukov I.S., Riapolov M.P., Bobreshov A.M. [Using fractal properties of network traffic for detecting LDoS attacks in dedicated server networks]. Nelineyny mir 2019;17(2):34-39. DOI: 10.18127/j20700970-201902-04. (in Russ.)

同舟云学术

1.学者识别学者识别

2.学术分析学术分析

3.人才评估人才评估

"同舟云学术"是以全球学者为主线,采集、加工和组织学术论文而形成的新型学术文献查询和分析系统,可以对全球学者进行文献检索和人才价值评估。用户可以通过关注某些学科领域的顶尖人物而持续追踪该领域的学科进展和研究前沿。经过近期的数据扩容,当前同舟云学术共收录了国内外主流学术期刊6万余种,收集的期刊论文及会议论文总量共计约1.5亿篇,并以每天添加12000余篇中外论文的速度递增。我们也可以为用户提供个性化、定制化的学者数据。欢迎来电咨询!咨询电话:010-8811{复制后删除}0370

www.globalauthorid.com

TOP

Copyright © 2019-2024 北京同舟云网络信息技术有限公司
京公网安备11010802033243号  京ICP备18003416号-3