[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ Skip to main content
Log in

Security Analysis Based on Controlling Dependences of Network Traffic Parameters by Wavelet Transformation

  • Published:
Automatic Control and Computer Sciences Aims and scope Submit manuscript

Abstract—

This article presents mathematical tools of wavelet transformations for use in detecting network traffic attacks. The technique consists in discrete wavelet transformation of parameters of network packets extracted from traffic and tracking the degree of dependence of various network traffic parameters using the multiple correlation coefficient. The efficiency of the proposed technique is shown in the results of experimental detections of SYN flood DoS attacks.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
£29.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price includes VAT (United Kingdom)

Instant access to the full article PDF.

Fig. 1.
Fig. 2.
Fig. 3.
Fig. 4.

Similar content being viewed by others

REFERENCES

  1. Sheluhin, O.I. and Atayero, A.A., Detection of DoS and DDoS attacks in information communication networks with discrete wavelet analysis, Int. J. Comput. Sci. Inf. Secur., 2012, vol. 10, no. 1, p. 53.

    Google Scholar 

  2. Loskutov, A.Yu., Time series analysis. Lecture course, Physical Faculty, Moscow State University. http://chaos.phys.msu.ru/ loskutov/PDF/Lectures_time_series_analysis.pdf. Accessed May 14, 2018.

  3. Kim, S.S., Reddy, A.L.N., and Vannucci, M., Detecting traffic anomalies using discrete wavelet transform, Proceedings of the International Conference on Information Networking, 2004.

  4. Salagean, M. and Firoiu, I., Anomaly detection of network traffic based on Analytical Discrete Wavelet Transform, Proc. of ICC, 2010.

  5. Tishina, N.A., Dvorovoi, I.G., and Solov’ev, N.A., Intrusion detection based on wavelet analysis of network traffic, Vestn. Ufim. Gos. Aviats. Tekh. Univ., 2010, vol. 14, no. 5, pp. 188–194.

    Google Scholar 

  6. Kwon, D.W., et al., Wavelet methods for the detection of anomalies and their application to network traffic analysis, Qual. Reliab. Eng. Int., 2006, vol. 22, no. 8, pp. 953–969.

    Article  Google Scholar 

  7. Shelukhin, O.I. and Garmashev, A.V., Detection of anomalous emissions of telecommunication traffic using discrete wavelet analysis methods, Elektromagn. Volny Elektron. Sist., 2012, vol. 17, no. 2, pp. 15–26.

    Google Scholar 

  8. Shelukhin, O.I. and Filinova, A.S., Comparative analysis of algorithms for detecting traffic anomalies using discrete wavelet analysis methods, T-Comm Telekomm. Transp., 2014, vol. 8, no. 9.

  9. Fatkieva, R.R., Atiskov, A.Yu., and Levonevskii, D.K., RF Patent 2 538 292, 2015.

  10. Ishkhanyan, M.V., Osnovy matematicheskogo prognozirovaniya sotsial’no-ekonomicheskikh protsessov (Basics of Mathematical Forecasting of Socio-Economic Processes), Moscow: Mosk. Gos. Univ. Putei Soobshch. Imp. Nikolaya II, 2016.

  11. DARPA Intrusion Detection Evaluation. Intrusion Detection Attacks Database. https://www.ll.mit.edu/ideval/data/1999/training/week2/index.html.

  12. Fatkieva, R.R., Development of attack detection metrics based on network traffic analysis, Vestn. Buryat. Gos. Univ., 2013, no. 9, pp. 81–86.

Download references

ACKNOWLEDGMENTS

The results were attained using the computational capacities of the supercomputer center of Peter the Great St. Petersburg Polytechnic University (SCC Politekhnicheskii) (http://www.spbstu.ru).

Project is financially supported by Ministry of Science and Higher Education of Russian Federation, Federal Program “Researching and Development in Priority Directions of Scientific and Technological Sphere in Russia within 2014–2020” (Contract 14.578.21.0231, September 26, 2017, the unique identifier of the agreement RFMEFI57817X0231).

Author information

Authors and Affiliations

Authors

Corresponding authors

Correspondence to D. S. Lavrova or I. V. Alekseev.

Additional information

Translated by S. Kuznetsov

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Lavrova, D.S., Alekseev, I.V. & Shtyrkina, A.A. Security Analysis Based on Controlling Dependences of Network Traffic Parameters by Wavelet Transformation. Aut. Control Comp. Sci. 52, 931–935 (2018). https://doi.org/10.3103/S0146411618080187

Download citation

  • Received:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.3103/S0146411618080187

Keywords:

Navigation