Skip to main content
Log in

Network Traffic Anomalies Detection Using a Fixing Method of Multifractal Dimension Jumps in a Real-Time Mode

  • Published:
Automatic Control and Computer Sciences Aims and scope Submit manuscript

Abstract

This article considers the possibility of detecting traffic anomalies on the basis of multiscale, multifractal analysis by monitoring fractal-dimensional jumps in real time. The method is based on the current estimation of multifractal properties of traffic using a sliding window and multiscale wavelet analysis. The numerical results allow us to conclude that fixing the jumplike change in the fractal dimension for various components of the multifractal spectrum makes it possible to pinpoint the presence of an anomaly with significant accuracy. In practice, the estimation of these multifractality components in this spectrum can be achieved by constructing a multichannel algorithm, each channel of which is oriented with the corresponding component of the multifractal spectrum.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1.
Fig. 2.
Fig. 3.

Similar content being viewed by others

REFERENCES

  1. Luo, X., Chan, E.W.W., and Chang, R.K.C., Vanguard: A new detection scheme for a class of TCP targeted denial-of-service attacks, EURASIP J. Adv. Signal Process., 2009, vol. 2009.

  2. Lu, L.F., Huang, M.L., Orgun, M.A., and Zhang, J.W., An improved wavelet analysis method for detecting DDoS attacks, 4th International Conference on Network and System Security, 2011, pp. 318–322.

  3. Chandola, V., Banerjee, A., and Kumar, V., Anomaly detection for discrete sequences: A survey, IEEE Trans. Knowl. Data Eng., 2012, vol. 24, no. 5.

  4. Mohiuddin, A., Abdun Naser, M., and Jiankun, H., A survey of network anomaly detection techniques, J. Network Comput. Appl., 2015, no. 60, p. 21.

  5. Bhuyan, M.H., Bhattacharyya, D.K., and Kalita, J.K., Network anomaly detection: Methods, systems and tools, IEEE Commun. Surv. Tutorials, 2013, vol. 60, no. 1, pp. 303–336.

    Google Scholar 

  6. Abry, P. and Veitch, D., Wavelet analysis of long-range dependent traffic, IEEE Trans. Inf. Theory, 1998, vol. 44, no. 1, pp. 2–15.

    Article  MathSciNet  MATH  Google Scholar 

  7. Abry, P., Taqqu, M.S., Flandrin, P., and Veitch, D., Wavelets for the analysis, estimation, and synthesis of scaling data, in Self -Similar Network Traffic and Performance Evaluation, Park, K. and Willinger, W., Eds., John Wiley & Sons, 2000, pp. 39–88.

  8. Zhengmin, X., Songnian, L., and Junhua, T., Note on studying change point of LRD traffic based on Li’s detection of DDoS flood attacking, Math. Probl. Eng., 2010, vol. 2010.

  9. Gagandeep Kaur, Vikas Saxena, and Jay Prakash, Study of self-similarity for detection of rate-based network anomalies, Int. J. Secur. Its Appl., 2017, vol. 11, no. 8, pp. 27–44.

    Google Scholar 

  10. Sheng, Z., Qifei, P., Xuezeng, P., and Xuhui, Z., Detection of low-rate DDoS attack based on self similarity, 2010 Second International Workshop on Education Technology and Computer Science, 2010, vol. 1, pp. 333–336.

  11. Kettani, H. and Gubner, J.A., A novel approach to the estimation of the Hurst parameter in self-similar traffic, Proceedings of the 27th Annual IEEE Conference on Local Computer Networks, Tampa, 2002, pp. 160–165.

  12. Cheng, X., Xie, K., and Wang, D., Network traffic anomaly detection based on self-similarity using HHT and wavelet transform, Proceedings of the 5th International Conference on Information Assurance and Security, Xian, 2009, pp. 710–713. doi 10.1109/IAS.2009.21910.1109/IAS.2009.219

  13. Wang, X. and Fang, B.X., An exploratory development on the Hurst parameter variety of network traffic abnormity signal, J. Harbin Inst. Technol., 2005, vol. 37, pp. 1046–1049.

    Google Scholar 

  14. Atayero, A.A. and Sheluhin, O.I., Integrated Model for Information Communication Systems and Networks. Design and Development, IGI Global, 2013.

    Book  Google Scholar 

  15. Sheluhin, O.I., Multifractals. Information Applications, Moscow: Hotline—Telecom, 2011.

    Google Scholar 

  16. Mallat, S., A Wavelet Tour of Signal Processing, Academic Press, 1998.

    MATH  Google Scholar 

  17. An Introduction to R. https://cran.r-project.org/doc/manuals/r-release/R-intro.html. Accessed July 6, 2018.

Download references

Author information

Authors and Affiliations

Authors

Corresponding authors

Correspondence to O. I. Sheluhin or I. Yu. Lukin.

Additional information

The article was translated by the authors.

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Sheluhin, O.I., Lukin, I.Y. Network Traffic Anomalies Detection Using a Fixing Method of Multifractal Dimension Jumps in a Real-Time Mode. Aut. Control Comp. Sci. 52, 421–430 (2018). https://doi.org/10.3103/S0146411618050115

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.3103/S0146411618050115

Keywords:

Navigation