DocumentCode
568418
Title
Triangle-Area-Based Multivariate Correlation Analysis for Effective Denial-of-Service Attack Detection
Author
Tan, Zhiyuan ; Jamdagni, Aruna ; He, Xiangjian ; Nanda, Priyadarsi ; Liu, Ren Ping
Author_Institution
Centre for Innovation in IT Services & Applic. (iNEXT), Univ. of Technol., Sydney, Sydney, NSW, Australia
fYear
2012
fDate
25-27 June 2012
Firstpage
33
Lastpage
40
Abstract
Cloud computing plays an important role in current converged networks. It brings convenience of accessing services and information to users regardless of location and time. However, there are some critical security issues residing in cloud computing, such as availability of services. Denial of service occurring on cloud computing has even more serious impact on the Internet. Therefore, this paper studies the techniques for detecting Denial-of-Service (DoS) attacks to network services and proposes an effective system for DoS attack detection. The proposed system applies the idea of Multivariate Correlation Analysis (MCA) to network traffic characterization and employs the principal of anomaly-based detection in attack recognition. This makes our solution capable of detecting known and unknown DoS attacks effectively by learning the patterns of legitimate network traffic only. Furthermore, a triangle area technique is proposed to enhance and speed up the process of MCA. The effectiveness of our proposed detection system is evaluated on the KDD Cup 99 dataset, and the influence of both non-normalized and normalized data on the performance of the detection system is examined. The results presented in the system evaluation section illustrate that our DoS attack detection system outperforms two state-of-the-art approaches.
Keywords
cloud computing; computer network performance evaluation; computer network security; DoS attack detection; Internet; KDD Cup dataset; MCA; anomaly-based detection principal; attack recognition; cloud computing; converged networks; denial-of-service attack detection; detection system performance examination; information access; legitimate network traffic patterns; network service access; network traffic characterization; nonnormalized data; normalized data; system evaluation section; triangle-area-based multivariate correlation analysis; Accuracy; Computer crime; Correlation; Detectors; Feature extraction; Labeling; Monitoring; Denial-of-Service attack; multivariate correlations; network traffic characterization; triangle area;
fLanguage
English
Publisher
ieee
Conference_Titel
Trust, Security and Privacy in Computing and Communications (TrustCom), 2012 IEEE 11th International Conference on
Conference_Location
Liverpool
Print_ISBN
978-1-4673-2172-3
Type
conf
DOI
10.1109/TrustCom.2012.284
Filename
6295955
Link To Document