Skip to main content

Detection of Network Attacks Using Hybrid ARIMA-GARCH Model

  • Conference paper
  • First Online:

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 582))

Abstract

In this article, an attempt to solve the problem of attacks (anomalies) detection in the analyzed network traffic with the use of a mixed statistical model (hybrid) ARIMA-GARCH is presented. The introductory actions consisted in normalization of elements of the analyzed time series by means of the Box-Cox transformation. To determine, though, if the analyzed time series were characterized by heteroscedasticity, they were subjected to the White’s test. For comparison, there were also tested with the use of differing statistical approaches (described by mean or conditional variance), realized by individual models of ARIMA and GARCH. The choice of optimal models’ parameters was performed as a compromise between the coherence of the model and the size of estimation error. To detect attacks (anomalies) in the network traffic, there were used relations between the proper estimated model of the network traffic, and its real parameters. The presented experimental results confirmed fitness and efficiency of the proposed solutions.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   129.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. Axelsson, S.: Intrusion detection systems: A survey and taxonomy. Technical report 99-15, Department of Computer Engineering (2000)

    Google Scholar 

  2. Jackson, K.: Intrusion Detection Systems (IDS), Product Survey. Los Alamos National Library, LA-UR-99-3883 (1999)

    Google Scholar 

  3. Hajji, H.: Statistical analysis of network traffic for adaptive faults detection. IEEE Trans. Neural Netw. 16(5), 1053–1063 (2005)

    Article  Google Scholar 

  4. Kiedrowski, P.: Toward more efficient and more secure last mile smart metering and smart lighting communication systems with the use of PLC/RF hybrid technology. Int. J. Distrib. Sens. Netw. 2015, 1–9 (2015). Article ID 675926. http://dx.doi.org/10.1155/2015/675926

    Article  Google Scholar 

  5. Barford, P., Kline, J., Plonka, D., Ron, A.: A signal analysis of network traffic anomalies. In: Proceedings of the 2nd ACM SIGCOMM Workshop on Internet Measurement, pp. 71–82. ACM (2002)

    Google Scholar 

  6. Chondola, V., Banerjee, A., Kumar, V.: Anomaly detection: a survey. ACM Comput. Surv. 41(3), 1–72 (2009)

    Article  Google Scholar 

  7. Yaacob, A., Tan, I., Chien, S., Tan, H.: ARIMA based network anomaly detection. In: Second International Conference on Communication Software and Networks, pp. 205–209. IEEE (2010)

    Google Scholar 

  8. Rodriguez, A., Mozos, M.: Improving network security through traffic log anomaly detection using time series analysis. In: Computational Intelligence in Security for Information Systems, pp. 125–133 (2010)

    Google Scholar 

  9. Liang, H., Xiaoming, B.: Research of DDoS attack mechanism and its defense frame. In: 3rd International Conference on Computer Research and Development, pp. 440–442 (2011)

    Google Scholar 

  10. Mirkovic, V.J., Prier, G., Reiher, P.: Attacking DDoS at the source. In: Proceedings of ICNP, pp. 312–321 (2002)

    Google Scholar 

  11. Thottan, M., Ji, C.: Anomaly detection in IP networks. IEEE Trans. Sig. Process. Spec. Issue Sig. Process. Netw. 51(8), 2191–2204 (2003)

    Google Scholar 

  12. Granger, C.W.J., Joyeux, R.: An introduction to long-memory time series models and fractional differencing. J. Time Ser. Anal. 1, 15–29 (1980)

    Article  MathSciNet  MATH  Google Scholar 

  13. Engle, R.: Autoregressive conditional heteroskedasticity with estimates of the variance of UK inflation. Econometrica 50, 987–1008 (1982)

    Article  MathSciNet  MATH  Google Scholar 

  14. Bollerslev, T.: Generalized autoregressive conditional heteroskedasticity. J. Econometrics 31, 307–327 (1986)

    Article  MathSciNet  MATH  Google Scholar 

  15. Tayefi, M., Ramanathan, T.V.: An overview of FIGARCH and related time series models. Austrian J. Stat. 41(3), 175–196 (2012)

    Google Scholar 

  16. Box, G., Jenkins, G., Reinsel, G.: Time Series Analysis. Holden-day, San Francisco (1970)

    MATH  Google Scholar 

  17. Baillie, R., Bollerslev, T., Mikkelsen, H.: Fractionally integrated generalized autoregressive conditional heteroskedasticity. J. Econometrics 74, 3–30 (1996)

    Article  MathSciNet  MATH  Google Scholar 

  18. Hosking, J.: Fractional differencing. Biometrika 68, 165–176 (1981)

    Article  MathSciNet  MATH  Google Scholar 

  19. Andersen, T.G., Bollerslev, T.: ARCH and GARCH models. In: Kotz, S., Read, C.B. Banks, D.L. (eds.) Encyclopaedia of Statistical Sciences, vol. 2. John Wiley and Sons (1998)

    Google Scholar 

  20. Liu, H., Shi, J.: Applying ARMA-GARCH approaches to forecasting short-term electricity prices. Energy Economics 37, 152–166 (2013)

    Article  MathSciNet  Google Scholar 

  21. Box, G.E.P., Cox, D.R.: An analysis of transformations. J. Roy. Stat. Soc. B 26, 211–252 (1964)

    MATH  Google Scholar 

  22. Brockwell, P., Davis, R.: Introduction to time series and forecasting. Springer Verlag (2002)

    Google Scholar 

  23. Hyndman, R.J., Khandakar, Y.: Automatic time series forecasting: the forecast package for R. J. Stat. Softw. 27(3), 1–22 (2008)

    Article  Google Scholar 

  24. SNORT - Intrusion Detection System. https://www.snort.org

  25. Andrysiak, T., Saganowski, Ł., Choras, M., Kozik, R.: Network traffic prediction and anomaly detection based on ARFIMA model. In: de la Puerta, J.G. et al., International Joint Conference SOCO’14-CISIS’14-ICEUTE’14 Advances in Intelligent Systems and Computing, vol. 299, pp. 545–554 (2014)

    Google Scholar 

  26. Kali Linux. https://www.kali.org

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Tomasz Andrysiak .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2018 Springer International Publishing AG

About this paper

Cite this paper

Andrysiak, T., Saganowski, Ł., Maszewski, M., Marchewka, A. (2018). Detection of Network Attacks Using Hybrid ARIMA-GARCH Model. In: Zamojski, W., Mazurkiewicz, J., Sugier, J., Walkowiak, T., Kacprzyk, J. (eds) Advances in Dependability Engineering of Complex Systems. DepCoS-RELCOMEX 2017. Advances in Intelligent Systems and Computing, vol 582. Springer, Cham. https://doi.org/10.1007/978-3-319-59415-6_1

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-59415-6_1

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-59414-9

  • Online ISBN: 978-3-319-59415-6

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics