Dynamic Modeling of Internet Traffic for Intrusion Detection

Computer network traffic is analyzed via mutual information techniques, implemented using linear and nonlinear canonical correlation analyses, with the specific objective of detecting UDP flooding attacks. NS simulation of HTTP, FTP, and CBR traffic shows that flooding attacks are accompanied by a c...

Full description

Bibliographic Details
Main Authors: Stephan Bohacek, Khushboo Shah, Edmond Jonckheere
Format: Article
Language:English
Published: SpringerOpen 2007-01-01
Series:EURASIP Journal on Advances in Signal Processing
Online Access:http://dx.doi.org/10.1155/2007/90312
_version_ 1819045017780486144
author Stephan Bohacek
Khushboo Shah
Edmond Jonckheere
author_facet Stephan Bohacek
Khushboo Shah
Edmond Jonckheere
author_sort Stephan Bohacek
collection DOAJ
description Computer network traffic is analyzed via mutual information techniques, implemented using linear and nonlinear canonical correlation analyses, with the specific objective of detecting UDP flooding attacks. NS simulation of HTTP, FTP, and CBR traffic shows that flooding attacks are accompanied by a change of mutual information, either at the link being flooded or at another upstream or downstream link. This observation appears to be topology independent, as the technique is demonstrated on the so-called parking-lot topology, random 50-node topology, and 100-node transit-stub topology. This technique is also employed to detect UDP flooding with low false alarm rate on a backbone link. These results indicate that a change in mutual information provides a useful detection criterion when no other signature of the attack is available.
first_indexed 2024-12-21T10:21:53Z
format Article
id doaj.art-dd4d2f55a7fc4a88ab08f4b767958e44
institution Directory Open Access Journal
issn 1687-6172
1687-6180
language English
last_indexed 2024-12-21T10:21:53Z
publishDate 2007-01-01
publisher SpringerOpen
record_format Article
series EURASIP Journal on Advances in Signal Processing
spelling doaj.art-dd4d2f55a7fc4a88ab08f4b767958e442022-12-21T19:07:25ZengSpringerOpenEURASIP Journal on Advances in Signal Processing1687-61721687-61802007-01-01200710.1155/2007/90312Dynamic Modeling of Internet Traffic for Intrusion DetectionStephan BohacekKhushboo ShahEdmond JonckheereComputer network traffic is analyzed via mutual information techniques, implemented using linear and nonlinear canonical correlation analyses, with the specific objective of detecting UDP flooding attacks. NS simulation of HTTP, FTP, and CBR traffic shows that flooding attacks are accompanied by a change of mutual information, either at the link being flooded or at another upstream or downstream link. This observation appears to be topology independent, as the technique is demonstrated on the so-called parking-lot topology, random 50-node topology, and 100-node transit-stub topology. This technique is also employed to detect UDP flooding with low false alarm rate on a backbone link. These results indicate that a change in mutual information provides a useful detection criterion when no other signature of the attack is available.http://dx.doi.org/10.1155/2007/90312
spellingShingle Stephan Bohacek
Khushboo Shah
Edmond Jonckheere
Dynamic Modeling of Internet Traffic for Intrusion Detection
EURASIP Journal on Advances in Signal Processing
title Dynamic Modeling of Internet Traffic for Intrusion Detection
title_full Dynamic Modeling of Internet Traffic for Intrusion Detection
title_fullStr Dynamic Modeling of Internet Traffic for Intrusion Detection
title_full_unstemmed Dynamic Modeling of Internet Traffic for Intrusion Detection
title_short Dynamic Modeling of Internet Traffic for Intrusion Detection
title_sort dynamic modeling of internet traffic for intrusion detection
url http://dx.doi.org/10.1155/2007/90312
work_keys_str_mv AT stephanbohacek dynamicmodelingofinternettrafficforintrusiondetection
AT khushbooshah dynamicmodelingofinternettrafficforintrusiondetection
AT edmondjonckheere dynamicmodelingofinternettrafficforintrusiondetection