Mostra i principali dati dell'item
Statistical models for the characterization, identification and mitigation of distributed attacks in data networks
dc.contributor.author | Di Mauro, Mario | |
dc.date.accessioned | 2019-01-16T12:15:04Z | |
dc.date.available | 2019-01-16T12:15:04Z | |
dc.date.issued | 2018-03-09 | |
dc.identifier.uri | http://hdl.handle.net/10556/3088 | |
dc.identifier.uri | http://dx.doi.org/10.14273/unisa-1371 | |
dc.description | 2016 - 2017 | it_IT |
dc.description.abstract | The thesis focuses on statistical approaches to model, mitigate, and prevent distributed network attacks. When dealing with distributed network attacks (and, more in general, with cyber-security problems), three fundamental phases/issues emerge distinctly. The first issue concerns the threat propagation across the network, which entails an "avalanche" effect, with the number of infected nodes increasing exponentially as time elapses. The second issue regards the design of proper mitigation strategies (e.g., threat detection, attacker's identification) aimed at containing the propagation phenomenon. Finally (and this is the third issue), it is also desirable to act on the system infrastructure to grant a conservative design by adding some controlled degree of redundancy, in order to face those cases where the attacker has not been yet defeated. The contributions of the present thesis address the aforementioned relevant issues, namely, propagation, mitigation and prevention of distributed network attacks. A brief summary of the main contributions is reported below. The first contribution concerns the adoption of Kendall’s birth-and-death process as an analytical model for threat propagation. Such a model exhibits two main properties: i) it is a stochastic model (a desirable requirement to embody the complexity of real-world networks) whereas many models are purely deterministic; ii) it is able to capture the essential features of threat propagation through a few parameters with a clear physical meaning. By exploiting the remarkable properties of Kendall’s model, the exact solution for the optimal resource allocation problem (namely, the optimal mitigation policy) has been provided for both conditions of perfectly known parameters, and unknown parameters (with the latter case being solved through a Maximum-Likelihood estimator). The second contribution pertains to the formalization of a novel kind of randomized Distributed Denial of Service (DDoS) attack. In particular, a botnet (a network of malicious entities) is able to emulate some normal traffic, by picking messages from a dictionary of admissible requests. Such a model allows to quantify the botnet “learning ability”, and to ascertain the real nature of users (normal or bot) via an indicator referred to as MIR (Message Innovation Rate). Exploiting the considered model, an algorithm that allows to identify a botnet (possibly) hidden in the network has been devised. The results are then extended to the case of a multi-cluster environment, where different botnets are concurrently present in the network, and an algorithm to identify the different clusters is conceived. The third contribution concerns the formalization of the network resilience problem and the consequent design of a prevention strategy. Two statistical frameworks are proposed to model the high availability requirements of network infrastructures, namely, the Stochastic Reward Network (SRN), and the Universal Generating Function (UGF) frameworks. In particular, since in the network environment dealing with multidimensional quantities is crucial, an extension of the classic UGF framework, called Multi-dimensional UGF (MUGF), is devised. [edited by author] | it_IT |
dc.language.iso | en | it_IT |
dc.publisher | Universita degli studi di Salerno | it_IT |
dc.subject | Distributed attacks | it_IT |
dc.subject | Cyber security | it_IT |
dc.subject | Signal processing for network security | it_IT |
dc.title | Statistical models for the characterization, identification and mitigation of distributed attacks in data networks | it_IT |
dc.type | Doctoral Thesis | it_IT |
dc.subject.miur | ING-INF/03 TELECOMUNICAZIONI | it_IT |
dc.contributor.coordinatore | Chiacchio, Pasquale | it_IT |
dc.description.ciclo | XVI n.s. | it_IT |
dc.contributor.tutor | Longo, Maurizio | it_IT |
dc.identifier.Dipartimento | Ingegneria dell'Informazione ed Elettrica e Matematica Applicata | it_IT |