Ensuring the survivability of embedded computer networks based on early detection of cyber attacks by integrating fractal analysis and statistical methods

被引:3
|
作者
Kotenko, Igor [1 ]
Saenko, Igor [1 ]
Lauta, Oleg [2 ]
Kribel, Aleksander [3 ]
机构
[1] Russian Acad Sci SPC RAS, St Petersburg Fed Res Ctr, 14 Th Liniya,39, St Petersburg 199178, Russia
[2] St Petersburg Admiral Makarov State Univ Maritime, Dvinskaya St 5-7, St Petersburg 198035, Russia
[3] St Petersburg Commun Acad, Tikhoretsky Av 3, St Petersburg 194064, Russia
基金
俄罗斯科学基金会;
关键词
Cyber attack; Embedded Computer Network; Survivability; Time Series; Fractal Analysis; Machine Learning; Hurst exponent;
D O I
10.1016/j.micpro.2022.104459
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
The paper discusses a method for ensuring the survivability of embedded computer networks in conditions of cyber attacks, based on identifying anomalies in network traffic by assessing its self-similarity and determining the type of impact of cyber attacks using statistical methods. The proposed method includes three stages, at which the analysis of the self-similarity property for the reference traffic is performed (using the Dickey-Fuller test, R/S analysis and the DFA method), the analysis of the self-similarity property for real traffic (by the same methods) and additional processing of time series with statistical methods (moving average, Z-Score and CUSUM methods). The issues of software implementation of the proposed method and the formation of a data set containing network packets are considered. The experimental results demonstrated the presence of self-similarity in network traffic and confirmed the high efficiency of the proposed method. The method allows detecting cyber attacks in real or near real time and ensures high survivability of the embedded computer network.
引用
收藏
页数:13
相关论文
共 5 条
  • [1] Method of Early Detection of Cyber-Attacks on Telecommunication Networks Based on Traffic Analysis by Extreme Filtering
    Privalov, Andrey
    Lukicheva, Vera
    Kotenko, Igor
    Saenko, Igor
    ENERGIES, 2019, 12 (24)
  • [2] A comparative analysis of various machine learning methods for anomaly detection in cyber attacks on IoT networks
    Inuwa, Muhammad Muhammad
    Das, Resul
    INTERNET OF THINGS, 2024, 26
  • [3] Increasing the Sensitivity of the Method of Early Detection of Cyber-Attacks in Telecommunication Networks Based on Traffic Analysis by Extreme Filtering
    Privalov, Andrey
    Lukicheva, Vera
    Kotenko, Igor
    Saenko, Igor
    ENERGIES, 2020, 13 (11)
  • [4] Learning-Based Methods for Cyber Attacks Detection in IoT Systems: A Survey on Methods, Analysis, and Future Prospects
    Inayat, Usman
    Zia, Muhammad Fahad
    Mahmood, Sajid
    Khalid, Haris M.
    Benbouzid, Mohamed
    ELECTRONICS, 2022, 11 (09)
  • [5] Sequential Statistical Analysis-Based Method for Attacks Detection in Cognitive Radio Networks
    Shakhov, Vladimir
    2022 27TH ASIA PACIFIC CONFERENCE ON COMMUNICATIONS (APCC 2022): CREATING INNOVATIVE COMMUNICATION TECHNOLOGIES FOR POST-PANDEMIC ERA, 2022, : 663 - 666