期刊文献+

Two-Tier GCT Based Approach for Attack Detection

Two-Tier GCT Based Approach for Attack Detection
下载PDF
导出
摘要 The frequent attacks on network infrastructure, using various forms of denial of service attacks, have led to an increased need for developing new techniques for analyzing network traffic. If efficient analysis tools were available, it could become possible to detect the attacks and to take action to weaken those attacks appropriately before they have had time to propagate across the network. In this paper, we propose an SNMP MIB oriented approach for detecting attacks, which is based on two-tier GCT by analyzing causal relationship between attacking variable at the attacker and abnormal variable at the target. According to the abnormal behavior at the target, GCT is executed initially to determine preliminary attacking variable, which has whole causality with abnormal variable in network behavior. Depending on behavior feature extracted from abnormal behavior, we can recognize attacking variable by using GCT again, which has local causality with abnormal variable in local behavior. Proactive detecting rules can be constructed with the causality between attacking variable and abnormal variable, which can be used to give alarms in network management system. The results of experiment showed that the approach with two-tier GCT was proved to detect attacks early, with which attack propagation could be slowed through early detection. The frequent attacks on network infrastructure, using various forms of denial of service attacks, have led to an increased need for developing new techniques for analyzing network traffic. If efficient analysis tools were available, it could become possible to detect the attacks and to take action to weaken those attacks appropriately before they have had time to propagate across the network. In this paper, we propose an SNMP MIB oriented approach for detecting attacks, which is based on two-tier GCT by analyzing causal relationship between attacking variable at the attacker and abnormal variable at the target. According to the abnormal behavior at the target, GCT is executed initially to determine preliminary attacking variable, which has whole causality with abnormal variable in network behavior. Depending on behavior feature extracted from abnormal behavior, we can recognize attacking variable by using GCT again, which has local causality with abnormal variable in local behavior. Proactive detecting rules can be constructed with the causality between attacking variable and abnormal variable, which can be used to give alarms in network management system. The results of experiment showed that the approach with two-tier GCT was proved to detect attacks early, with which attack propagation could be slowed through early detection.
出处 《Journal of Software Engineering and Applications》 2008年第1期60-67,共8页 软件工程与应用(英文)
关键词 Network BEHAVIOR ATTACK Detection GRANGER CAUSALITY Test Management Information BASE Network Behavior Attack Detection Granger Causality Test Management Information Base
  • 相关文献

参考文献2

二级参考文献20

  • 1ADAS A. Traffic models in broadband networks[J]. IEEE Communications Magazine, 1997, 35(7): 82-89.
  • 2MAGLARIS B, et al. Performance models of statistical multiplexing in packet video communications[J]. IEEE Trans Commun,1998,36(7): 834-844.
  • 3GRUNENFELDER R, et al. Characterization of video codecs as autoregressive moving average processes and ralated queuing system performance[J]. IEEE JSAC, 1991,9(4): 283-293.
  • 4FROST V, MEL AMED B. Traffic modeling for telecommunications networks[J]. IEEE Communication Magazine, 1994, 32(3):70-81.
  • 5BASU S, MUKHERJEE A, KLIVANSKY S. Time series models for Internet traffic[A]. Proceedings of INFORCOM[C].1996.611-620.
  • 6SANG A, LIS. A predictability analysis of network traffic[A]. Proceedings of IEEEINFOCOM 2000[C]. 2000. 342-351.
  • 7NORROS I. On the use of fractional brownian motion in the theory of connectionless traffic[J]. IEEE Journal of Selected Areas in Communications, 1995, 13(6): 953-962.
  • 8WILFRID J, FRANK J. Introduction to statistical analysis, third edition[M]. New York: McGraw-Hill Book Company, 1983.
  • 9GEORGEE GWILYMM GREGORYC 顾岚 范金诚译.时间序列分析--预测与控制[M].北京:中国统计出版社,1997..
  • 10SHIM C, RYOO I, LEE J, et al. Modeling and call admission control algorithm of variable bit rate video in ATM networks[J]. IEEE Journal on Selected Areas in Communications, 1994, 12(2): 332-344.

共引文献21

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部