2005 Journal of Software. Router Anomaly Traffic Detection Based on Modified-CUSUM Algorithms

Σχετικά έγγραφα
ΝΕΑ ΑΠΟΤΕΛΕΣΜΑΤΑ ΣΧΕΤΙΚΑ ΜΕ ΤΗΝ ΥΠΑΡΞΗ ΕΚΤΙΜΗΤΩΝ ΜΕΓΙΣΤΗΣ ΠΙΘΑΝΟΦΑΝΕΙΑΣ ΓΙΑ ΤΗΝ 3-ΠΑΡΑΜΕΤΡΙΚΗ ΓΑΜΜΑ ΚΑΤΑΝΟΜΗ

Power allocation under per-antenna power constraints in multiuser MIMO systems

The Research on Sampling Estimation of Seasonal Index Based on Stratified Random Sampling

Cytotoxicity of ionic liquids and precursor compounds towards human cell line HeLa

Exam Statistics 6 th September 2017 Solution

On Inclusion Relation of Absolute Summability

2005 Journal of Software , ) , ) Automatic Selection of Kernel-Bandwidth for Mean-Shift Object Tracking

Outline. M/M/1 Queue (infinite buffer) M/M/1/N (finite buffer) Networks of M/M/1 Queues M/G/1 Priority Queue

Study on Ascertaining the Amount of the Quality Claims about Large2scale Mechanical and Electrical Engineering Based on the System Efficiency

( ) , ) , ; kg 1) 80 % kg. Vol. 28,No. 1 Jan.,2006 RESOURCES SCIENCE : (2006) ,2 ,,,, ; ;

Applied Study of Hilbert-huang Transform and Elman Neural Network on Flow Regime Identification for Gas-liquid Two-phase Flow

IF(Ingerchange Format) [7] IF C-STAR(Consortium for speech translation advanced research ) [8] IF 2 IF

Approach to Automatic Translation Template Acquisition Based on Statistical Learning

A Sequential Experimental Design based on Bayesian Statistics for Online Automatic Tuning. Reiji SUDA,

Conductivity Logging for Thermal Spring Well

!" # C*D ." + % 67$ '*? ( V #% I!5 I! > 3 . #B % !"#$ % &!$ '( )* *!"#$ $+", -.#/0 .#*..#/0!"#$ B 1G L3:*1( CE CLV )#IB Z 4 Q " +* -1 LTV

CS 1675 Introduction to Machine Learning Lecture 7. Density estimation. Milos Hauskrecht 5329 Sennott Square

FREE VIBRATION OF A SINGLE-DEGREE-OF-FREEDOM SYSTEM Revision B

Iterative Learning Control with a Forgetting Factor for Consensus Tracking in Multi-Agent Systems

VSC STEADY2STATE MOD EL AND ITS NONL INEAR CONTROL OF VSC2HVDC SYSTEM VSC (1. , ; 2. , )

No. 7 Modular Machine Tool & Automatic Manufacturing Technique. Jul TH166 TG659 A

Development of the Nursing Program for Rehabilitation of Woman Diagnosed with Breast Cancer

, Litrrow. Maxwell. Helmholtz Fredholm, . 40 Maystre [4 ], Goray [5 ], Kleemann [6 ] PACC: 4210, 4110H

Proposal of Terminal Self Location Estimation Method to Consider Wireless Sensor Network Environment

Error ana lysis of P2wave non2hyperbolic m oveout veloc ity in layered media

Estimators when the Correlation Coefficient. is Negative

ER-Tree (Extended R*-Tree)

J. of Math. (PRC) Shannon-McMillan, , McMillan [2] Breiman [3] , Algoet Cover [10] AEP. P (X n m = x n m) = p m,n (x n m) > 0, x i X, 0 m i n. (1.

ΕΝΑ ΜΗ ΠΑΡΑΜΕΤΡΙΚΟ ΔΙΑΓΡΑΜΜΑ ΕΛΕΓΧΟΥ ΜΕ ΧΡΗΣΗ ΔΙΑΤΕΤΑΓΜΕΝΩΝ ΔΕΙΓΜΑΤΩΝ

Resurvey of Possible Seismic Fissures in the Old-Edo River in Tokyo

Vol. 31,No JOURNAL OF CHINA UNIVERSITY OF SCIENCE AND TECHNOLOGY Feb

Last Lecture. Biostatistics Statistical Inference Lecture 19 Likelihood Ratio Test. Example of Hypothesis Testing.

Pro duction Technology and Technical Efficiency in ( k, y) Sp ace

Multi-attribute Decision-making to Rank Urban Water Supply Schemes

Quick algorithm f or computing core attribute

PACS: Pq, Tp

A study on generalized absolute summability factors for a triangular matrix

Homework for 1/27 Due 2/5

5 Haar, R. Haar,. Antonads 994, Dogaru & Carn Kerkyacharan & Pcard 996. : Haar. Haar, y r x f rt xβ r + ε r x β r + mr k β r k ψ kx + ε r x, r,.. x [,

On Hypersurface of Special Finsler Spaces. Admitting Metric Like Tensor Field

ITU-R SA (2010/01)! " # $% & '( ) * +,

A Fault Identification Algorithm for Satellite Networks Based on System Level Diagnosis

, P bkc (c[0, 1]) P bkc (L p [0, 1]) (1) 2 P bkc (X) O A (2012) Aumann. R. J., [3]. Feb Vol. 28 No.

ΕΘΝΙΚΗ ΣΧΟΛΗ ΔΗΜΟΣΙΑΣ ΔΙΟΙΚΗΣΗΣ ΙΓ' ΕΚΠΑΙΔΕΥΤΙΚΗ ΣΕΙΡΑ

ΣΤΥΛΙΑΝΟΥ ΣΟΦΙΑ

Retrieval of Seismic Data Recorded on Open-reel-type Magnetic Tapes (MT) by Using Existing Devices

High order interpolation function for surface contact problem

Outage Probability of Cognitive Relay Network Considering the Interference Link from Primary Users on the Secondary Relay and Receiver

Correction of chromatic aberration for human eyes with diffractive-refractive hybrid elements

Research on Real-Time Collision Detection Based on Hybrid Hierarchical Bounding Volume

Political Science 552

ΑΞΙΟΛΟΓΗΣΗ ΜΕΘΟΔΩΝ ΣΥΓΚΡΙΣΗΣ ΥΠΟΚΕΙΜΕΝΩΝ ΚΑΜΠΥΛΩΝ ΕΠΙΒΙΩΣΗΣ ΣΕ ΔΕΔΟΜΕΝΑ ΜΕ ΤΥΧΑΙΑ ΑΠΟΚΟΠΗ

Studies on Properties and Estimation Problems for Modified Extension of Exponential Distribution

Neutralino contributions to Dark Matter, LHC and future Linear Collider searches

Q L -BFGS. Method of Q through full waveform inversion based on L -BFGS algorithm. SUN Hui-qiu HAN Li-guo XU Yang-yang GAO Han ZHOU Yan ZHANG Pan

1 (forward modeling) 2 (data-driven modeling) e- Quest EnergyPlus DeST 1.1. {X t } ARMA. S.Sp. Pappas [4]

Vol. 34 ( 2014 ) No. 4. J. of Math. (PRC) : A : (2014) Frank-Wolfe [7],. Frank-Wolfe, ( ).

A Method for Determining Service Level of Road Network Based on Improved Capacity Model

DEXP. Using ratio DEXP for depth imaging of gravity gradient data. CHEN Ling-na 1 ZENG Zhao-fa 1 YUAN Yuan 2 3 SUN Xiao-yu 4

ΜΕΤΑΠΤΥΧΙΑΚΗ ΕΡΕΥΝΗΤΙΚΗ ΔΙΑΤΡΙΒΗ

DDoS (Denial of Service Attacks)

T he Op tim al L PM Po rtfo lio M odel of H arlow s and Its So lving M ethod

ΧΡΟΝΟΙ ΑΝΑΜΟΝΗΣ ΜΕΧΡΙ ΤΗΝ ΠΡΩΤΗ ΕΜΦΑΝΙΣΗ ΣΧΗΜΑΤΙΣΜΩΝ ΣΕ ΜΙΑ ΔΙΔΙΑΣΤΑΤΗ ΑΚΟΛΟΥΘΙΑ ΤΡΙΤΙΜΩΝ ΔΟΚΙΜΩΝ

Stochastic Finite Element Analysis for Composite Pressure Vessel

ΑΓΓΕΛΗΣ ΧΡΗΣΤΟΣ ΠΑΝΑΓΙΩΤΗΣ 6 OO ΑΓΓΕΛΙΔΗΣ ΧΑΡΙΛΑΟΣ ΧΡΗΣΤΟΣ 4 OO ΑΓΓΟΥ ΑΝΑΣΤΑΣΙΑ ΔΗΜΗΤΡΙΟΣ 6 OO ΑΔΑΜΙΔΟΥ ΕΥΑΓΓΕΛΙΑ ΑΒΡΑΑΜ 3 OO ΑΛΕΒΙΖΟΥ ΠΑΝΑΓΙΩΤΑ

J. of Math. (PRC) 6 n (nt ) + n V = 0, (1.1) n t + div. div(n T ) = n τ (T L(x) T ), (1.2) n)xx (nt ) x + nv x = J 0, (1.4) n. 6 n

Nov Journal of Zhengzhou University Engineering Science Vol. 36 No FCM. A doi /j. issn

[1], [2] - (Danfoss, Rexroth, Char-Lynn. [3, 4, 5]), .. [6]. [7]

ΣΤΗ ΣΧΕ ΙΑΣΗ ΕΚΠΑΙ ΕΥΤΙΚΟΥ ΛΟΓΙΣΜΙΚΟΥ 1

PID.

Web-based supplementary materials for Bayesian Quantile Regression for Ordinal Longitudinal Data

Technical Information T-9100 SI. Suva. refrigerants. Thermodynamic Properties of. Suva Refrigerant [R-410A (50/50)]

Research on Economics and Management

K. Hausdorff K K O X = SDA. symbolic data analysis SDA SDA. Vol. 16 No. 3 Mar JOURNAL OF MANAGEMENT SCIENCES IN CHINA

Development of a Tiltmeter with a XY Magnetic Detector (Part +)

Errata (Includes critical corrections only for the 1 st & 2 nd reprint)

M in ing the Com pa tib ility Law of M ultid im en siona l M ed ic ines Ba sed on D ependence M ode Sets

Adaptive grouping difference variation wolf pack algorithm

* ** *** *** Jun S HIMADA*, Kyoko O HSUMI**, Kazuhiko O HBA*** and Atsushi M ARUYAMA***

DuPont Suva 95 Refrigerant

ibemo Kazakhstan Republic of Kazakhstan, West Kazakhstan Oblast, Aksai, Pramzone, BKKS office complex Phone: ; Fax:

DuPont Suva 95 Refrigerant

n 1 n 3 choice node (shelf) choice node (rough group) choice node (representative candidate)

E#ects of Drying on Bacterial Activity and Iron Formation in Acid Sulfate Soils

Applying Markov Decision Processes to Role-playing Game

Rapid Acquisitio n of Doppler Shift in Satellite Co mmunicatio ns

Cite as: Pol Antras, course materials for International Economics I, Spring MIT OpenCourseWare ( Massachusetts

MATH 38061/MATH48061/MATH68061: MULTIVARIATE STATISTICS Solutions to Problems on Matrix Algebra

Estimation of stability region for a class of switched linear systems with multiple equilibrium points

Outline. Detection Theory. Background. Background (Cont.)

46 2. Coula Coula Coula [7], Coula. Coula C(u, v) = φ [ ] {φ(u) + φ(v)}, u, v [, ]. (2.) φ( ) (generator), : [, ], ; φ() = ;, φ ( ). φ [ ] ( ) φ( ) []

Global energy use: Decoupling or convergence?

35 90% %

DuPont Suva. DuPont. Thermodynamic Properties of. Refrigerant (R-410A) Technical Information. refrigerants T-410A ENG

= f(0) + f dt. = f. O 2 (x, u) x=(x 1,x 2,,x n ) T, f(x) =(f 1 (x), f 2 (x),, f n (x)) T. f x = A = f

ΓΕΩΠΟΝΙΚΟ ΠΑΝΕΠΙΣΤΗΜΙΟ ΑΘΗΝΩΝ ΤΜΗΜΑ ΑΓΡΟΤΙΚΗΣ ΟΙΚΟΝΟΜΙΑΣ & ΑΝΑΠΤΥΞΗΣ

Influence of Flow Rate on Nitrate Removal in Flow Process

«ΠΡΟΓΡΑΜΜΑ ΑΝΑΠΤΥΞΗΣ ΤΗΣ ΒΙΟΜΗΧΑΝΙΚΗΣ ΕΡΕΥΝΑΣ ΚΑΙ ΤΕΧΝΟΛΟΓΙΑΣ ΣΕ ΝΕΕΣ ΕΠΙΧΕΙΡΗΣΕΙΣ (ΠΑΒΕΤ-ΝΕ-2004)»

1 B0 C00. nly Difo. r II. on III t o. ly II II. Di XR. Di un 5.8. Di Dinly. Di F/ / Dint. mou. on.3 3 D. 3.5 ird Thi. oun F/2. s m F/3 /3.

Study of urban housing development projects: The general planning of Alexandria City

Transcript:

-9825/25/6(227 25 Joural of Software Vol6 No2 CUSUM + ( 2 Router Aoaly Traffc Detecto Based o Modfed-CUSUM Algorths SUN h-x + TANG Y-We CHENG Yua (College of Coputer Scece ad Techology Najg Uersty of Posts ad Telecoucatos Najg 2 Cha + Correspodg author Ph +86-25-859895 E-al suzx@jupteduc http//wwwupteduc Receed 24-8-24; Accepted 25--7 Su X Tag YW Cheg Y Router aoaly traffc detecto based o odfed-cusum algorths Joural of Software 256(227 223 DOI 36/jos627 Abstract The paper as at the chage of core routers ports gress ad egress traffc eployg a odfed CUSUM (cuulate su algorth to trace ther statstcs characterstc real te ad detect etwork flow aborty Accordg to the characterstcs of ult-ports a router the paper puts forward a atrx-based ult-statstcs odfed CUSUM algorth (M-CUSUM M-CUSUM presets a adjustable paraeter setup syste to crease detectg accuracy M-CUSUM algorth ca otor chages of the equal alue real te through calculatg the rato betwee the subtractg ad plus absolute alue aog gress ad egress ports traffc Sulato experets dcate that the algorth has the hgher detectg speed ad accuracy to DOS/DDOS attacks ad speds less syste resources The algorth has bee used successfully software routers Key words CUSUM (cuulate su algorth; DOS (deal of serce; DDOS(dstrbuted deal of serce; router; truso detecto CUSUM(cuulate su CUSUM (M-CUSUM M-CUSUM DOS/DDOS CUSUM ; ; TP393 A Supported by the Natoal Natural Scece Foudato of Cha uder Grat No7275 ( ; the Natoal Hgh-Tech Research ad Deelopet Pla of Cha uder Grat No25AA7755 ( (863; the Scetfc Research Foudato for the Retured Oerseas Chese Scholars Mstry of Educato of Cha ad Najg Goeret ( ; the Scetfc Research Foudato of Huawe ad E Corporato of Cha ( (964 ; (982 ; (98

28 Joural of Software 256(2 Iteret TCP/IP (DOS (DDOS 2 2 YahooeBUYAazoCNN DOS DDOS DOS/DDOS CUSUM(cuulate su DOS/DDOS 2 CUSUM M-CUSUM 3 M-CUSUM [2] SYN FLOOD CUSUM TCP SYN FIN CUSUM SYN FLOOD SYN FIN [3] 9 TCP SYN FIN CUSUM [] SYN FLOOD DOS/DDOS DOS/DDOS [4] [3] MIT (adapted threshold algorth CUSUM CUSUM [5] TCP URGACKPSHRSTSYNFIN 6 SYN FLOOD UDPICMP [5] [6] IP IP M-CUSUM 2 CUSUM (M-CUSUM 2 CUSUM CUSUM [8 ] CUSUM

CUSUM 29 x x N ( x x x N(δ t 2 x t x x2 x3 x t ( < L t+ t+ 2 t+ 3 = t = ( φ( N( φ( x φ( x φ( x = = + = + = = = exp δ x φ( x φ( x δ 2 δ φ( x = x = A = l L = δ x + + 2 x x2 x t x t+ xt+ 2 xt+ 3 δ Λ = ax Λ = ax δ x (2 < 2 δ > δ = ax x (3 < 2 h = 2 h x / 2 > h x + x > h x + x + x 2 3δ / 2 > h x + x + + x δ / 2 > h δ k x = x ; x = Sk = x S = 2 { S } ax{ } ax{ } ax{ S = x x S + S = x S S = x } = x (4 k δ / 2 = ax{ + x k} = 2 (5 CUSUM h > > h( h = 2 22 CUSUM (M-CUSUM CUSUM (X CUSUM X CUSUM {x } δ = ( β δ + β δ (6 x = x = x d (7 S = S = (8 Y S S k k = (9 δ {x =23 } β EWMA(expoetally weghted og aerage β=3d E( 2 t t ( h Y h=23 t (

22 Joural of Software 256(2 CUSUM (M-CUSUM Y Y = X + = ax Y t >h { S Sk } = ax{ S + Sk } k k { Sk S } = ax{ Y } k + Y = ( Y + = + x x > X = x Y Y ( 3 CUSUM ( 3 C ( ( Cout C ( ( out C E < < ( ( t (2 Cout + C C ( Cout ( Cout ( << C ( C ( << Cout ( > E >> t Cout C (3 ( + ( C C t out t 32 C ( Cout ( t = ax E = 23 whe attack s ot happeed (4 Cout ( + C ( [8] CUSUM CUSUM ( C ( Cout ( x = =23 (5 C ( + C ( out x ( t t < = x d δ d DOS/DDOS 2 X T a ρ T = f{ Y h} a > a (6 ρ = T T (7

CUSUM 22 f T a d ( h d Y h Y h x d = µ δ µ (525 (8 h = λ δ λ (2 (9 = µ λ δ δ (6 (7 (7 k ρ = f k ( x d > h (2 µ λ 5 25% µ λ ( x 25% 3 ( x 5% (2 CUSUM µ λ h d 33 CUSUM Syste cotrol Router Packets Socket data collecto I/Out data Statstc per te M-Cusu algorth Alar Log Fg Syste structure µ λ h d

222 Joural of Software 256(2 (5 x x M-CUSUM ( (6 x δ ; (2 (7 ; (3 ( Y ; (4 Y >h (6 δ µ (525 λ (3575 ; (8 (9 h d h d 34 µ = 5 λ = 5 β= s( /s δ =8955 = 336 d h = 78 5 5 SYN FLOOD 2 4 Fg2 x state chage 2 x Fg3 state chage 3 Fg4 Y state chage 4 Y x 5 5 Y h DOS/DDOS M-CUSUM

CUSUM 223 % 225 M-CUSUM 9% 9% 5 [3] M-CUSUM M-CUSUM 4 CUSUM Refereces [] Wag HN hag DL Kag GS Detectg SYN floodg attacks IEEE Coputer ad Coucato Socety 223(6 53 539 [2] hu WT L JS Hog PL A router aget based dstrbuted floodg detecto syste Chese Joural of Coputers 23 26(585 59 ( Chese wth Eglsh abstract [3] Srs VA Papagalou F Applcato of aoaly detecto algorths for detectg SYN floodg attacks I Proc of the Cof o Global Telecoucatos (GLOBECOM 24 IEEE 24 25 254 [4] Xag Y L Y Le WL Huag SJ Detectg DDOS attack based o etwork self-slarty IEEE It l Cof o Coucatos 245(3292 295 [5] J SY Yeug DS A coarace aalyss odel for DDoS attack detecto I Proc of the It l Cof o Coucatos IEEE 24 882 886 [6] Feste L Schackeberg D Balupar R Kdred D Statstcal approaches to DDoS attack detecto ad respose I Proc of the DARPA Iforato Surablty Cof ad Exposto 23 33 34 [7] Oskper T Poor HV Matrx CUSUM A recurse ult-hypothess chage detecto algorth I Proc of the 2 IEEE It l Syp o Iforato Theory 2 [8] Pu Xl O the prog of cuulate su chart ACTA Matheatcae Applcatae SINICA 2326(2226 24 ( Chese wth Eglsh abstract [9] Morgester VM Upadhyaya BR Beedett M Sgal aoaly detecto usg odfed CUSUM ethod I Proc of the 27th IEEE Cof o Decso ad Cotrol 988 234 234 [] Moustakdes GV Perforace of CUSUM tests for detectg chages cotuous te processes I Moustakdes GV ed Proc of the IEEE It l Syp Iforato Theory 2286 87 [2] 2326(585 59 [8] (CUSUM 2326(2226 24