2014 International Conference on Electronics, Communications and Computers (CONIELECOMP) 2014
DOI: 10.1109/conielecomp.2014.6808591
|View full text |Cite
|
Sign up to set email alerts
|

Characterization of worm attacks using entropy, Mahalanobis distance and K-nearest neighbors

Abstract: This paper presents an algorithm based on entropy and Mahalanobis distance to characterize the behavior of worms attack. For this, is built a matrix with estimates of entropy of different intrinsic features of the network traffic, of this matrix four parameters {µ, , , d 2 } are obtained. These values determine an ellipsoidal region that characterizes the behavior of the worm within the space defined by the traffic features. Tests were conducted with two types of traces, one obtained from a LAN network traffic… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
8
0

Year Published

2014
2014
2015
2015

Publication Types

Select...
2
1

Relationship

3
0

Authors

Journals

citations
Cited by 3 publications
(8 citation statements)
references
References 8 publications
0
8
0
Order By: Relevance
“…In network traffic, the most commonly employed features are [2,[15][16][17][18][19]: source and destination IP addresses and source and destination port numbers. Other features extracted from headers are: protocol field, number of bytes, service, flag, and country code.…”
Section: Feature Extractionmentioning
confidence: 99%
See 2 more Smart Citations
“…In network traffic, the most commonly employed features are [2,[15][16][17][18][19]: source and destination IP addresses and source and destination port numbers. Other features extracted from headers are: protocol field, number of bytes, service, flag, and country code.…”
Section: Feature Extractionmentioning
confidence: 99%
“…The window sizes most commonly used are: 5 min [15,16,[23][24][25], 30 min, 1 min, 100 sec, 5 sec and 0.5 sec. Some researchers use windows with a fixed length L = 4096 [19], 1000 [26], and 32 [4] packets. Therefore, the main objective of windowing is to reduce the data volume.…”
Section: Windowing In Network Trafficmentioning
confidence: 99%
See 1 more Smart Citation
“…An improvement to the previous work [5] was proposed in [6] where the proposed algorithm uses the Mahalanobis distance to the exclusion of outliers, and an ellipsoidal regions were generated by calculating the parameters {x, γ, λ, LT }, wherex is the mean vector of the matrix H, γ, λ are the eigenvectors and eigenvalues of the covariance matrix of H, and LT is the limit of Mahalanobis distance for H [7]. In both works, network traffic behavior was characterized by regular ellipsoidal regions.…”
Section: Introductionmentioning
confidence: 99%
“…If a point is an anomaly and the majority of its temporal neighbors belong to a specific anomaly class, then it belongs to this class. Therefore, results were obtained using the k-temporal nearest neighbors algorithm, as in [6]. Table 2.…”
Section: Classification Of Worm Attacksmentioning
confidence: 99%