A Cluster-based Approach Towards Detecting and Modeling Network Dictionary Attacks
In this paper, we provide an approach to detect network dictionary attacks using a data set collected as flows based on which a clustered graph is resulted. These flows provide an aggregated view of the network traffic in which the exchanged packets in the network are considered so that more interna...
Main Authors: | , , |
---|---|
Format: | Article |
Language: | English |
Published: |
D. G. Pylarinos
2016-12-01
|
Series: | Engineering, Technology & Applied Science Research |
Subjects: | |
Online Access: | https://etasr.com/index.php/ETASR/article/view/937 |
id |
doaj-3c67f718679a4b2b901daf01481d8c0f |
---|---|
record_format |
Article |
spelling |
doaj-3c67f718679a4b2b901daf01481d8c0f2020-12-02T16:19:57ZengD. G. PylarinosEngineering, Technology & Applied Science Research2241-44871792-80362016-12-0166A Cluster-based Approach Towards Detecting and Modeling Network Dictionary AttacksA. Tajari Siahmarzkooh0J. Karimpour1S. Lotfi2Department of Computer Science, University of Tabriz, Tabriz, IranDepartment of Computer Science, University of Tabriz, Tabriz, IranDepartment of Computer Science, University of Tabriz, Tabriz, IranIn this paper, we provide an approach to detect network dictionary attacks using a data set collected as flows based on which a clustered graph is resulted. These flows provide an aggregated view of the network traffic in which the exchanged packets in the network are considered so that more internally connected nodes would be clustered. We show that dictionary attacks could be detected through some parameters namely the number and the weight of clusters in time series and their evolution over the time. Additionally, the Markov model based on the average weight of clusters,will be also created. Finally, by means of our suggested model, we demonstrate that artificial clusters of the flows are created for normal and malicious traffic. The results of the proposed approach on CAIDA 2007 data set suggest a high accuracy for the model and, therefore, it provides a proper method for detecting the dictionary attack. https://etasr.com/index.php/ETASR/article/view/937intrusion detectionMarkov chaingrpah clusteringdictionary attack |
collection |
DOAJ |
language |
English |
format |
Article |
sources |
DOAJ |
author |
A. Tajari Siahmarzkooh J. Karimpour S. Lotfi |
spellingShingle |
A. Tajari Siahmarzkooh J. Karimpour S. Lotfi A Cluster-based Approach Towards Detecting and Modeling Network Dictionary Attacks Engineering, Technology & Applied Science Research intrusion detection Markov chain grpah clustering dictionary attack |
author_facet |
A. Tajari Siahmarzkooh J. Karimpour S. Lotfi |
author_sort |
A. Tajari Siahmarzkooh |
title |
A Cluster-based Approach Towards Detecting and Modeling Network Dictionary Attacks |
title_short |
A Cluster-based Approach Towards Detecting and Modeling Network Dictionary Attacks |
title_full |
A Cluster-based Approach Towards Detecting and Modeling Network Dictionary Attacks |
title_fullStr |
A Cluster-based Approach Towards Detecting and Modeling Network Dictionary Attacks |
title_full_unstemmed |
A Cluster-based Approach Towards Detecting and Modeling Network Dictionary Attacks |
title_sort |
cluster-based approach towards detecting and modeling network dictionary attacks |
publisher |
D. G. Pylarinos |
series |
Engineering, Technology & Applied Science Research |
issn |
2241-4487 1792-8036 |
publishDate |
2016-12-01 |
description |
In this paper, we provide an approach to detect network dictionary attacks using a data set collected as flows based on which a clustered graph is resulted. These flows provide an aggregated view of the network traffic in which the exchanged packets in the network are considered so that more internally connected nodes would be clustered. We show that dictionary attacks could be detected through some parameters namely the number and the weight of clusters in time series and their evolution over the time. Additionally, the Markov model based on the average weight of clusters,will be also created. Finally, by means of our suggested model, we demonstrate that artificial clusters of the flows are created for normal and malicious traffic. The results of the proposed approach on CAIDA 2007 data set suggest a high accuracy for the model and, therefore, it provides a proper method for detecting the dictionary attack.
|
topic |
intrusion detection Markov chain grpah clustering dictionary attack |
url |
https://etasr.com/index.php/ETASR/article/view/937 |
work_keys_str_mv |
AT atajarisiahmarzkooh aclusterbasedapproachtowardsdetectingandmodelingnetworkdictionaryattacks AT jkarimpour aclusterbasedapproachtowardsdetectingandmodelingnetworkdictionaryattacks AT slotfi aclusterbasedapproachtowardsdetectingandmodelingnetworkdictionaryattacks AT atajarisiahmarzkooh clusterbasedapproachtowardsdetectingandmodelingnetworkdictionaryattacks AT jkarimpour clusterbasedapproachtowardsdetectingandmodelingnetworkdictionaryattacks AT slotfi clusterbasedapproachtowardsdetectingandmodelingnetworkdictionaryattacks |
_version_ |
1724405092152508416 |