首页> 外文期刊>Cryptography >Anomalous Traffic Detection and Self-Similarity Analysis in the Environment of ATMSim
【24h】

Anomalous Traffic Detection and Self-Similarity Analysis in the Environment of ATMSim

机译:ATMSim环境下的交通异常检测和自相似性分析

获取原文
           

摘要

Internet utilisation has steadily increased, predominantly due to the rapid recent development of information and communication networks and the widespread distribution of smartphones. As a result of this increase in Internet consumption, various types of services, including web services, social networking services (SNS), Internet banking, and remote processing systems have been created. These services have significantly enhanced global quality of life. However, as a negative side-effect of this rapid development, serious information security problems have also surfaced, which has led to serious to Internet privacy invasions and network attacks. In an attempt to contribute to the process of addressing these problems, this paper proposes a process to detect anomalous traffic using self-similarity analysis in the Anomaly Teletraffic detection Measurement analysis Simulator (ATMSim) environment as a research method. Simulations were performed to measure normal and anomalous traffic. First, normal traffic for each attack, including the Address Resolution Protocol (ARP) and distributed denial-of-service (DDoS) was measured for 48 h over 10 iterations. Hadoop was used to facilitate processing of the large amount of collected data, after which MapReduce was utilised after storing the data in the Hadoop Distributed File System (HDFS). A new platform on Hadoop, the detection system ATMSim, was used to identify anomalous traffic after which a comparative analysis of the normal and anomalous traffic was performed through a self-similarity analysis. There were four categories of collected traffic that were divided according to the attack methods used: normal local area network (LAN) traffic, DDoS attack, and ARP spoofing, as well as DDoS and ARP attack. ATMSim, the anomaly traffic detection system, was used to determine if real attacks could be identified effectively. To achieve this, the ATMSim was used in simulations for each scenario to test its ability to distinguish between normal and anomalous traffic. The graphic and quantitative analyses in this study, based on the self-similarity estimation for the four different traffic types, showed a burstiness phenomenon when anomalous traffic occurred and self-similarity values were high. This differed significantly from the results obtained when normal traffic, such as LAN traffic, occurred. In further studies, this anomaly detection approach can be utilised with biologically inspired techniques that can predict behaviour, such as the artificial neural network (ANN) or fuzzy approach.
机译:互联网利用率一直在稳定增长,这主要是由于最近信息和通信网络的快速发展以及智能手机的广泛分布。由于Internet消费的增加,已经创建了各种类型的服务,包括Web服务,社交网络服务(SNS),Internet银行业务和远程处理系统。这些服务大大提高了全球生活质量。但是,作为这种快速发展的负面影响,严重的信息安全问题也已浮出水面,导致严重的Internet隐私入侵和网络攻击。为了有助于解决这些问题,本文提出了一种在异常流量检测测量分析模拟器(ATMSim)环境中使用自相似性分析来检测异常流量的过程作为研究方法。进行了模拟以测量正常流量和异常流量。首先,在10次迭代中测量了48小时内每种攻击的正常流量,包括地址解析协议(ARP)和分布式服务拒绝(DDoS)。 Hadoop用于促进处理大量收集的数据,之后将数据存储在Hadoop分布式文件系统(HDFS)中,然后利用MapReduce。使用Hadoop上的新平台检测系统ATMSim来识别异常流量,然后通过自相似性分析对正常流量和异常流量进行比较分析。根据所使用的攻击方法,将收集到的流量分为四类:正常的局域网(LAN)流量,DDoS攻击和ARP欺骗以及DDoS和ARP攻击。异常流量检测系统ATMSim用于确定是否可以有效识别实际攻击。为了实现这一目标,在每种情况的模拟中都使用了ATMSim,以测试其区分正常流量和异常流量的能力。本研究中的图形和定量分析基于四种不同交通类型的自相似性估计,显示了当交通异常发生且自相似性值较高时的突发现象。这与发生正常流量(例如LAN流量)时获得的结果有很大不同。在进一步的研究中,可以将这种异常检测方法与可以预测行为的受生物学启发的技术一起使用,例如人工神经网络(ANN)或模糊方法。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号