Dynamic Latency Sensitivity Recognition: An Application to Energy Saving

In the world of connected everything, network attacks and cyber-security breaches may cause huge monetary damages and even endanger lives; hence, full sanitization of the Internet traffic is a real necessity. In this paper we will apply a dynamic statistical analysis to separate latency sensitive traffic from the latency insensitive one at the source. Then, we will calculate the energy savings that can be achieved by identifying and dropping all the unwanted portion of the latency insensitive traffic directly at the source. This value represents an upper-bound to the actual amount of energy that can be saved by applying our adaptive aggressive intrusion detection technique to latency insensitive traffic, in fact the actual value depends on the actual load of the network and its capability to spread the hunt for malicious packet among all the network nodes. The main contribution of this paper is to show that energy savings through aggressive intrusion detection may be achieved without burdening latency sensitive traffic with delays that may render it unusable, nonetheless, as a side effect of early removal of unwanted traffic from the network flows is to reduce the network load, the traffic reduction so obtained allows sanitizing even the latency sensitive traffic with a reduced risk of excessive delays due to resources allocation and traffic forecasting errors.

[1]  Xiangliang Zhang,et al.  Autonomic intrusion detection: Adaptively detecting anomalies over unlabeled audit data streams in computer networks , 2014, Knowl. Based Syst..

[2]  WangWei,et al.  Autonomic intrusion detection , 2014 .

[3]  Zhenfu Cao,et al.  A Probabilistic Misbehavior Detection Scheme toward Efficient Trust Establishment in Delay-Tolerant Networks , 2014 .

[4]  Alessio Merlo,et al.  Improving energy efficiency in distributed intrusion detection systems , 2013, J. High Speed Networks.

[5]  Luiz Eduardo Soares de Oliveira,et al.  Towards an Energy-Efficient Anomaly-Based Intrusion Detection Engine for Embedded Systems , 2017, IEEE Transactions on Computers.

[6]  Ing-Ray Chen,et al.  A survey of intrusion detection in wireless network applications , 2014, Comput. Commun..

[7]  Jugal K. Kalita,et al.  Network Anomaly Detection: Methods, Systems and Tools , 2014, IEEE Communications Surveys & Tutorials.

[8]  Alessio Merlo,et al.  IPS-based reduction of network energy consumption , 2016, Log. J. IGPL.

[9]  Brett J. Borghetti,et al.  A Survey of Distance and Similarity Measures Used Within Network Intrusion Anomaly Detection , 2015, IEEE Communications Surveys & Tutorials.

[10]  Alessio Merlo,et al.  SKETURE: A Sketch-based Packet Analysis Tool , 2015, MIST@CCS.

[11]  Ala Altaweel,et al.  Traffic-and-resource-aware intrusion detection in wireless mesh networks , 2014, Ad Hoc Networks.

[12]  S. Mercy Shalinie,et al.  A survey of distributed denial of service attack , 2016, 2016 10th International Conference on Intelligent Systems and Control (ISCO).

[13]  Chun-Hung Richard Lin,et al.  Intrusion detection system: A comprehensive review , 2013, J. Netw. Comput. Appl..

[14]  Ahmed Patel,et al.  An intrusion detection and prevention system in cloud computing: A systematic review , 2013, J. Netw. Comput. Appl..

[15]  Fakhroddin Noorbehbahani,et al.  An incremental intrusion detection system using a new semi‐supervised stream classification method , 2017, Int. J. Commun. Syst..

[16]  Evangelos P. Markatos,et al.  LEoNIDS: A Low-Latency and Energy-Efficient Network-Level Intrusion Detection System , 2016, IEEE Transactions on Emerging Topics in Computing.

[17]  Yu-Lin He,et al.  Fuzziness based semi-supervised learning approach for intrusion detection system , 2017, Inf. Sci..

[18]  John A. Clark,et al.  Power-Aware Intrusion Detection in Mobile Ad Hoc Networks , 2009, ADHOCNETS.

[19]  Chih-Fong Tsai,et al.  CANN: An intrusion detection system based on combining cluster centers and nearest neighbors , 2015, Knowl. Based Syst..

[20]  Dong Hyun Jeong,et al.  A multi-level intrusion detection method for abnormal network behaviors , 2016, J. Netw. Comput. Appl..

[21]  Muttukrishnan Rajarajan,et al.  A survey of intrusion detection techniques in Cloud , 2013, J. Netw. Comput. Appl..

[22]  Ketan Sanjay Desale,et al.  Efficient Intrusion Detection System Using Stream Data Mining Classification Technique , 2015, 2015 International Conference on Computing Communication Control and Automation.

[23]  Alessio Merlo,et al.  Generating statistical insights into network behavior using SKETURE , 2016, J. High Speed Networks.