skip to main content
10.1145/2490428.2490450acmconferencesArticle/Chapter ViewAbstractPublication PagessecuritConference Proceedingsconference-collections
research-article

Evaluation on multivariate correlation analysis based denial-of-service attack detection system

Published:17 August 2012Publication History

ABSTRACT

In this paper, a Denial-of-Service (DoS) attack detection system is explored, where a multivariate correlation analysis technique based on Euclidean distance is applied for network traffic characterization and the principal of anomaly-based detection is employed in attack recognition. The effectiveness of the detection system is evaluated on the KDD Cup 99 dataset and the influence of data normalization on the performance of attack detection is analyzed in this paper as well. The evaluation results and comparisons prove that the detection system is effective in distinguishing DoS attack network traffic from legitimate network traffic and outperforms two state-of-the-art systems.

References

  1. C. Manikopoulos and S. Papavassiliou, "Network Intrusion and Fault Detection: A Statistical Anomaly Approach," Communications Magazine, IEEE, vol. 40, pp. 76--82, 2002. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. M. Fugate and J. R. Gattiker, "Computer Intrusion Detection with Classification and Anomaly Detection Using SVMs," International Journal of Pattern Recognition and Artificial Intelligence, vol. 17, pp. 441--458, 2003.Google ScholarGoogle ScholarCross RefCross Ref
  3. M. Thottan and C. Ji, "Anomaly Detection in IP Networks," Signal Processing, IEEE Transactions on, vol. 51, pp. 2191--2204, 2003. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. H. Wang, et al., "Change-point Monitoring for the Detection of DoS Attacks," IEEE Transactions on Dependable and Secure Computing, pp. 193--208, 2004. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. S. T. Sarasamma, et al., "Hierarchical Kohonenen Net for Anomaly Detection in Network Security," Systems, Man, and Cybernetics, Part B: Cybernetics, IEEE Transactions on, vol. 35, pp. 302--312, 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. S. Jin, et al., "Network Intrusion Detection in Covariance Feature Space," Pattern Recognition, vol. 40, pp. 2185--2197, 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. M. Tavallaee, et al., "A novel covariance matrix based approach for detecting network anomalies," presented at The Communication Networks and Services Research Conference, 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. C. F. Tsai and C. Y. Lin, "A Triangle Area Based Nearest Neighbors Approach to Intrusion Detection," Pattern Recognition, vol. 43, pp. 222--229, 2010. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. A. Jamdagni, et al., "Intrusion Detection Using GSAD Model for HTTP Traffic on Web Services," presented at the 6th International Wireless Communications and Mobile Computing Conference 2010. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. Z. Tan, et al., "A Two-tier System for Web Attack Detection Using Linear Discriminant Method," The 12th International Conference on Information and Communications Security, pp 459--471, 2010. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. Z. Tan, et al., "Denial-of-Service Attack Detection Based on Multivariate Correlation Analysis," presented at the Neural Information Processing, 2011.Google ScholarGoogle Scholar
  12. J. Cheng, et al., "KDD Cup 2001 report," ACM SIGKDD Explorations Newsletter}, vol. 3, pp. 47--64, 2002. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. W. Wang, et al., "Attribute Normalization in Network Intrusion Detection," presented at the 10th International Symposium on Pervasive Systems, Algorithms, and Networks 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Evaluation on multivariate correlation analysis based denial-of-service attack detection system

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in
    • Published in

      cover image ACM Conferences
      SecurIT '12: Proceedings of the First International Conference on Security of Internet of Things
      August 2012
      266 pages
      ISBN:9781450318228
      DOI:10.1145/2490428

      Copyright © 2012 ACM

      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 17 August 2012

      Permissions

      Request permissions about this article.

      Request Permissions

      Check for updates

      Qualifiers

      • research-article

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader