期刊论文详细信息
Entropy
Anomalies Detection and Proactive Defence of Routers Based on Multiple Information Learning
Yulong Shen1  Teng Li2  Jianfeng Ma2  Qingqi Pei3 
[1] School of Computer Science, Xidian University, Xi’an 710071, China;School of Cyber Engineering, Xidian University, Xi’an 710071, China;Shaanxi Key Laboratory of BlockChain and Security Computing, Xidian University, Xi’an 710071, China;
关键词: router security;    data correlation;    attack detection;   
DOI  :  10.3390/e21080734
来源: DOAJ
【 摘 要 】

Routers are of great importance in the network that forward the data among the communication devices. If an attack attempts to intercept the information or make the network paralyzed, it can launch an attack towards the router and realize the suspicious goal. Therefore, protecting router security has great importance. However, router systems are notoriously difficult to understand or diagnose for their inaccessibility and heterogeneity. A common way of gaining access to the router system and detecting the anomaly behaviors is to inspect the router syslogs or monitor the packets of information flowing to the routers. These approaches just diagnose the routers from one aspect but do not correlate multiple logs. In this paper, we propose an approach to detect the anomalies and faults of the routers with multiple information learning. First, we do the offline learning to transform the benign or corrupted user actions into the syslogs. Then, we construct the log correlation among different events. During the detection phase, we calculate the distance between the event and the cluster to decide if it is an anomalous event and we use the attack chain to predict the potential threat. We applied our approach in a university network which contains Huawei, Cisco and Dlink routers for three months. We aligned our experiment with former work as a baseline for comparison. Our approach obtained 89.6% accuracy in detecting the attacks, which is 5.1% higher than the former work. The results show that our approach performs in limited time as well as memory usages and has high detection and low false positives.

【 授权许可】

Unknown   

  文献评价指标  
  下载次数:0次 浏览次数:0次