Abstract—
This article presents mathematical tools of wavelet transformations for use in detecting network traffic attacks. The technique consists in discrete wavelet transformation of parameters of network packets extracted from traffic and tracking the degree of dependence of various network traffic parameters using the multiple correlation coefficient. The efficiency of the proposed technique is shown in the results of experimental detections of SYN flood DoS attacks.
Similar content being viewed by others
REFERENCES
Sheluhin, O.I. and Atayero, A.A., Detection of DoS and DDoS attacks in information communication networks with discrete wavelet analysis, Int. J. Comput. Sci. Inf. Secur., 2012, vol. 10, no. 1, p. 53.
Loskutov, A.Yu., Time series analysis. Lecture course, Physical Faculty, Moscow State University. http://chaos.phys.msu.ru/ loskutov/PDF/Lectures_time_series_analysis.pdf. Accessed May 14, 2018.
Kim, S.S., Reddy, A.L.N., and Vannucci, M., Detecting traffic anomalies using discrete wavelet transform, Proceedings of the International Conference on Information Networking, 2004.
Salagean, M. and Firoiu, I., Anomaly detection of network traffic based on Analytical Discrete Wavelet Transform, Proc. of ICC, 2010.
Tishina, N.A., Dvorovoi, I.G., and Solov’ev, N.A., Intrusion detection based on wavelet analysis of network traffic, Vestn. Ufim. Gos. Aviats. Tekh. Univ., 2010, vol. 14, no. 5, pp. 188–194.
Kwon, D.W., et al., Wavelet methods for the detection of anomalies and their application to network traffic analysis, Qual. Reliab. Eng. Int., 2006, vol. 22, no. 8, pp. 953–969.
Shelukhin, O.I. and Garmashev, A.V., Detection of anomalous emissions of telecommunication traffic using discrete wavelet analysis methods, Elektromagn. Volny Elektron. Sist., 2012, vol. 17, no. 2, pp. 15–26.
Shelukhin, O.I. and Filinova, A.S., Comparative analysis of algorithms for detecting traffic anomalies using discrete wavelet analysis methods, T-Comm Telekomm. Transp., 2014, vol. 8, no. 9.
Fatkieva, R.R., Atiskov, A.Yu., and Levonevskii, D.K., RF Patent 2 538 292, 2015.
Ishkhanyan, M.V., Osnovy matematicheskogo prognozirovaniya sotsial’no-ekonomicheskikh protsessov (Basics of Mathematical Forecasting of Socio-Economic Processes), Moscow: Mosk. Gos. Univ. Putei Soobshch. Imp. Nikolaya II, 2016.
DARPA Intrusion Detection Evaluation. Intrusion Detection Attacks Database. https://www.ll.mit.edu/ideval/data/1999/training/week2/index.html.
Fatkieva, R.R., Development of attack detection metrics based on network traffic analysis, Vestn. Buryat. Gos. Univ., 2013, no. 9, pp. 81–86.
ACKNOWLEDGMENTS
The results were attained using the computational capacities of the supercomputer center of Peter the Great St. Petersburg Polytechnic University (SCC Politekhnicheskii) (http://www.spbstu.ru).
Project is financially supported by Ministry of Science and Higher Education of Russian Federation, Federal Program “Researching and Development in Priority Directions of Scientific and Technological Sphere in Russia within 2014–2020” (Contract 14.578.21.0231, September 26, 2017, the unique identifier of the agreement RFMEFI57817X0231).
Author information
Authors and Affiliations
Corresponding authors
Additional information
Translated by S. Kuznetsov
About this article
Cite this article
Lavrova, D.S., Alekseev, I.V. & Shtyrkina, A.A. Security Analysis Based on Controlling Dependences of Network Traffic Parameters by Wavelet Transformation. Aut. Control Comp. Sci. 52, 931–935 (2018). https://doi.org/10.3103/S0146411618080187
Received:
Published:
Issue Date:
DOI: https://doi.org/10.3103/S0146411618080187