<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Publishing DTD v1.3 20210610//EN" "JATS-journalpublishing1-3.dtd">
<article article-type="research-article" dtd-version="1.3" xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xml:lang="ru"><front><journal-meta><journal-id journal-id-type="publisher-id">tuzsut</journal-id><journal-title-group><journal-title xml:lang="ru">Труды учебных заведений связи</journal-title><trans-title-group xml:lang="en"><trans-title>Proceedings of Telecommunication Universities</trans-title></trans-title-group></journal-title-group><issn pub-type="ppub">1813-324X</issn><issn pub-type="epub">2712-8830</issn><publisher><publisher-name>СПбГУТ</publisher-name></publisher></journal-meta><article-meta><article-id pub-id-type="doi">10.31854/1813-324X-2023-9-5-112-119</article-id><article-id custom-type="elpub" pub-id-type="custom">tuzsut-518</article-id><article-categories><subj-group subj-group-type="heading"><subject>Research Article</subject></subj-group><subj-group subj-group-type="section-heading" xml:lang="ru"><subject>ИНФОРМАЦИОННЫЕ ТЕХНОЛОГИИ И ТЕЛЕКОММУНИКАЦИИ</subject></subj-group><subj-group subj-group-type="section-heading" xml:lang="en"><subject>INFORMATION TECHNOLOGIES AND TELECOMMUNICATION</subject></subj-group></article-categories><title-group><article-title>Статистические характеристики фрактальной размерности трафика IoT на примере набора данных Kitsune</article-title><trans-title-group xml:lang="en"><trans-title>IoT Traffic Fractal Dimension Statistical Characteristics on the Kitsune Dataset Example</trans-title></trans-title-group></title-group><contrib-group><contrib contrib-type="author" corresp="yes"><contrib-id contrib-id-type="orcid">https://orcid.org/0000-0001-7564-6744</contrib-id><name-alternatives><name name-style="eastern" xml:lang="ru"><surname>Шелухин</surname><given-names>О. И.</given-names></name><name name-style="western" xml:lang="en"><surname>Shelukhin</surname><given-names>O.</given-names></name></name-alternatives><bio xml:lang="ru"><p>доктор технических наук, профессор, заведующий кафедрой «Информационная безопасность» Московского технического университета связи и информатики</p></bio><email xlink:type="simple">sheluhin@mail.ru</email><xref ref-type="aff" rid="aff-1"/></contrib><contrib contrib-type="author" corresp="yes"><contrib-id contrib-id-type="orcid">https://orcid.org/0000-0002-4593-9009</contrib-id><name-alternatives><name name-style="eastern" xml:lang="ru"><surname>Рыбаков</surname><given-names>С. Ю.</given-names></name><name name-style="western" xml:lang="en"><surname>Rybakov</surname><given-names>S.</given-names></name></name-alternatives><bio xml:lang="ru"><p>аспирант кафедры «Информационная безопасность» Московского технического университета связи и информатики</p></bio><email xlink:type="simple">s.i.rybakov@mtuci.ru</email><xref ref-type="aff" rid="aff-1"/></contrib></contrib-group><aff-alternatives id="aff-1"><aff xml:lang="ru">Московский технический университет связи и информатики<country>Россия</country></aff><aff xml:lang="en">Moscow Technical University of Communications and Informatics<country>Russian Federation</country></aff></aff-alternatives><pub-date pub-type="collection"><year>2023</year></pub-date><pub-date pub-type="epub"><day>15</day><month>11</month><year>2023</year></pub-date><volume>9</volume><issue>5</issue><fpage>112</fpage><lpage>119</lpage><permissions><copyright-statement>Copyright &amp;#x00A9; Шелухин О.И., Рыбаков С.Ю., 2023</copyright-statement><copyright-year>2023</copyright-year><copyright-holder xml:lang="ru">Шелухин О.И., Рыбаков С.Ю.</copyright-holder><copyright-holder xml:lang="en">Shelukhin O., Rybakov S.</copyright-holder><license license-type="creative-commons-attribution" xlink:href="https://creativecommons.org/licenses/by/4.0/" xlink:type="simple"><license-p>This work is licensed under a Creative Commons Attribution 4.0 License.</license-p></license></permissions><self-uri xlink:href="https://tuzs.sut.ru/jour/article/view/518">https://tuzs.sut.ru/jour/article/view/518</self-uri><abstract><p>В работе рассмотрен метод оценки фрактальных свойств трафика, а также проведена оценка статистических параметров фрактальной размерности (ФР) трафика IoT. Анализ реального трафика с атаками из дампа Kitsune и проведенный анализ фрактальных свойств трафика в нормальном режиме и при воздействии атак типа SSDP Flood, Mirai, OS Scan показал, что скачки ФР трафика при возникновении атак могут быть использованы при создании алгоритмов обнаружения компьютерных атак в сетях IoT. Исследования показали, что в случае онлайн-анализа сетевого трафика при оценке ФР следует отдать предпочтение модифицированному алгоритму оценки показателя Херста в скользящем окне анализа.</p></abstract><trans-abstract xml:lang="en"><p>The paper considers a method for estimating the fractal properties of traffic, and also evaluates the statistical parameters of the fractal dimension of IoT traffic. An analysis of real traffic with attacks from the Kitsune dump and an analysis of the fractal properties of traffic in normal mode and under the influence of attacks such as SSDP Flood, Mirai, OS Scan showed that jumps in the fractal dimension of traffic when attacks occur can be used to create algorithms for detecting computer attacks in IoT networks. Studies have shown that in the case of online analysis of network traffic, when assessing the RF, preference should be given to the modified algorithm for estimating the Hurst exponent in a sliding analysis window.</p></trans-abstract><kwd-group xml:lang="ru"><kwd>показатель Херста</kwd><kwd>фрактальная размерность</kwd><kwd>трешолдинг</kwd><kwd>компьютерная атака</kwd><kwd>сетевой трафик</kwd><kwd>интернет вещей</kwd></kwd-group><kwd-group xml:lang="en"><kwd>Hurst exponent</kwd><kwd>fractal dimension</kwd><kwd>thresholding</kwd><kwd>computer attack</kwd><kwd>network traffic</kwd><kwd>internet of things</kwd></kwd-group></article-meta></front><back><ref-list><title>References</title><ref id="cit1"><label>1</label><citation-alternatives><mixed-citation xml:lang="ru">Minerva R., Biru A., Rotondi D. Towards a definition of the Internet of Things (IoT). Telecom Italia S.p.A., 2015. PP. 10–21. URL: https://iot.ieee.org/images/files/pdf/IEEE_IoT_Towards_Definition_Internet_of_Things_Revision1_27MAY15.pdf (Accessed 25.10.2023)</mixed-citation><mixed-citation xml:lang="en">Minerva R., Biru A., Rotondi D. Towards a definition of the Internet of Things (IoT). Telecom Italia S.p.A.; 2015. p.10–21. URL: https://iot.ieee.org/images/files/pdf/IEEE_IoT_Towards_Definition_Internet_of_Things_Revision1_27MAY15.pdf [Access-ed 25.10.2023]</mixed-citation></citation-alternatives></ref><ref id="cit2"><label>2</label><citation-alternatives><mixed-citation xml:lang="ru">Dorsemaine B., Gaulier J.-P., Wary J.-P., Kheir N., Urien P. Internet of Things: A Definition &amp; Taxonomy // Proceedings of the 9th International Conference on Next Generation Mobile Applications, Services and Technologies (NGMAST, Cambridge, UK, 09‒11 September 2015). IEEE, 2015. DOI:10.1109/NGMAST.2015.71</mixed-citation><mixed-citation xml:lang="en">Dorsemaine B., Gaulier J.-P., Wary J.-P., Kheir N., Urien P. Internet of Things: A Definition &amp; Taxonomy. Proceedings of the 9th International Conference on Next Generation Mobile Applications, Services and Technologies (NGMAST, Cambridge, UK, 09‒11 September 2015). IEEE; 2015. DOI:10.1109/NGMAST.2015.71</mixed-citation></citation-alternatives></ref><ref id="cit3"><label>3</label><citation-alternatives><mixed-citation xml:lang="ru">Internet of Things (IoT) connected devices installed base worldwide from 2015 to 2025 // Statista. URL: https://www.statista.com/statistics/471264/iot-number-of-connected-devices-worldwide (Accessed 12.02.2023)</mixed-citation><mixed-citation xml:lang="en">Statista. Internet of Things (IoT) connected devices installed base worldwide from 2015 to 2025. URL: https://www.statista.com/statistics/471264/iot-number-of-connected-devices-worldwide [Accessed 12.02.2023]</mixed-citation></citation-alternatives></ref><ref id="cit4"><label>4</label><citation-alternatives><mixed-citation xml:lang="ru">Demeter D., Preuss M., Shmelev Y. IoT: a malware story // Securelist. 2019. URL: https://securelist.com/iot-a-malware-story/94451 (Accessed 11.02.2023)</mixed-citation><mixed-citation xml:lang="en">Securelist. Demeter D., Preuss M., Shmelev Y. IoT: a malware story. 2019. URL: https://securelist.com/iot-a-malware-story/94451 [Accessed 11.02.2023]</mixed-citation></citation-alternatives></ref><ref id="cit5"><label>5</label><citation-alternatives><mixed-citation xml:lang="ru">Шевцов В.Ю., Касимовский Н.П. Анализ угроз и уязвимостей концепций IOT и IIOT // НБИ технологии. 2020. Т. 14. № 3. С. 28–35. DOI:10.15688/NBIT.jvolsu.2020.3.5</mixed-citation><mixed-citation xml:lang="en">Shevtsov V.Y., Kasimovsky N.P Threat and vulnerability analysis of IoT and IIoT concepts. NBI technologies. 2020;14(3): 28‒35. DOI:10.15688/NBIT.jvolsu.2020.3.5</mixed-citation></citation-alternatives></ref><ref id="cit6"><label>6</label><citation-alternatives><mixed-citation xml:lang="ru">Шелухин О.И. Сетевые аномалии. Обнаружение, локализация, прогнозирование. М.: Горячая линия ‒ Телеком, 2019. 448 с.</mixed-citation><mixed-citation xml:lang="en">Sheluhin O. I. Network Anomalies. Detection, Localization, Forecasting. Moscow: Goryachaya liniya ‒ Telekom Publ.; 2019. 448 p.</mixed-citation></citation-alternatives></ref><ref id="cit7"><label>7</label><citation-alternatives><mixed-citation xml:lang="ru">Шелухин О.И. Осин А.В. Смольский С.М. Самоподобие и фракталы. Телекоммуникационные приложения. М.: Физматлит. 2008. 368 с.</mixed-citation><mixed-citation xml:lang="en">Sheluhin O.I., Osin A.V., Smolsky S.M. Self-Similarity and Fractals. Telecommunication. Moscow: Fizmatlit Publ.; 2008. 368 p.</mixed-citation></citation-alternatives></ref><ref id="cit8"><label>8</label><citation-alternatives><mixed-citation xml:lang="ru">Sheluhin O.I., Lukin I.Yu. Network traffic anomalies detection using fixing method of jumps of multifractal dimension in the real-time mode // Automatic Control and Computer Sciences. 2018. Vol. 52. Iss. 5. PP. 421−430. DOI:10.3103/S01464 11618050115</mixed-citation><mixed-citation xml:lang="en">Sheluhin O.I., Lukin I.Yu. Network traffic anomalies detection using fixing method of jumps of multifractal dimension in the real-time mode. Automatic Control and Computer Sciences. 2018;52(5):421‒430. DOI:10.3103/S0146411618050115</mixed-citation></citation-alternatives></ref><ref id="cit9"><label>9</label><citation-alternatives><mixed-citation xml:lang="ru">Шелухин О.И., Рыбаков С.Ю., Ванюшина А.В. Модификация алгоритма обнаружения сетевых атак методом фиксации скачков фрактальной размерности в режиме online // Труды учебных заведений связи. 2022. Т. 8. № 3. С. 117‒126. DOI:10.31854/1813-324X-2022-8-3-117-126</mixed-citation><mixed-citation xml:lang="en">Sheluhin O., Rybakov S., Vanyushina A. Modified Algorithm for Detecting Network Attacks Using the Fractal Dimension Jump Estimation Method in Online Mode. Proceedings of Telecom. Univ. 2022;8(3):117‒126. DOI:10.31854/1813-324X-2022-8-3-117-126</mixed-citation></citation-alternatives></ref><ref id="cit10"><label>10</label><citation-alternatives><mixed-citation xml:lang="ru">Sheluhin O.I., Rybakov S.Y., Vanyushina A.V. Detection of Network Anomalies with the Method of Fixing Jumps of the Fractal Dimension in the Online Mode // Proceedings of the Conference on Wave Electronics and its Application in Information and Telecommunication Systems (WECONF, St. Petersburg, Russia, 30 May ‒ 03 June 2022). IEEE, 2022. DOI:10.1109/WECONF55058.2022.9803635</mixed-citation><mixed-citation xml:lang="en">Sheluhin O.I., Rybakov S.Y., Vanyushina A.V. Detection of Network Anomalies with the Method of Fixing Jumps of the Fractal Dimension in the Online Mode. Proceedings of the Conference on Wave Electronics and its Application in Information and Telecommunication Systems. WECONF, 30 May ‒ 03 June 2022, St. Petersburg, Russia. IEEE; 2022. DOI:10.1109/WECONF55058.2022.9803635</mixed-citation></citation-alternatives></ref><ref id="cit11"><label>11</label><citation-alternatives><mixed-citation xml:lang="ru">Sheluhin O.I., Rakovskiy D.I. Multi-Label Learning in Computer Networks // Proceedings of the Conference on Systems of Signals Generating and Processing in the Field of on Board Communications (Moscow, Russia, 14‒16 March 2023). IEEE, 2023. DOI:10.1109/IEEECONF56737.2023.10092157</mixed-citation><mixed-citation xml:lang="en">Sheluhin O.I., Rakovskiy D.I. Multi-Label Learning in Computer Networks. Proceedings of the Conference on Systems of Signals Generating and Processing in the Field of on Board Communications, 14‒16 March 2023, Moscow, Russia. IEEE; 2023. DOI:10.1109/IEEECONF56737.2023.10092157</mixed-citation></citation-alternatives></ref><ref id="cit12"><label>12</label><citation-alternatives><mixed-citation xml:lang="ru">Большаков А.С., Губанкова Е.В. Обнаружение аномалий в компьютерных сетях с использованием методов машинного обучения // REDS: Телекоммуникационные устройства и системы. 2020. Т. 10. № 1. С. 37‒42.</mixed-citation><mixed-citation xml:lang="en">Bolshakov A.S., Gubankova E.V. Anomaly detection in computer networks using machine learning methods. REDS: Telecommunication Devices and Systems. 2020;10(1):37‒42.</mixed-citation></citation-alternatives></ref><ref id="cit13"><label>13</label><citation-alternatives><mixed-citation xml:lang="ru">Mirsky Y., Doitshman T., Elovici Y., Shabtai A. Kitsune: An Ensemble of Autoencoders for Online Network Intrusion Detection // arXiv:1802.09089. 2018. DOI:10.48550/arXiv.1802.09089</mixed-citation><mixed-citation xml:lang="en">Mirsky Y., Doitshman T., Elovici Y., Shabtai A. Kitsune: An Ensemble of Autoencoders for Online Network Intrusion Detection. arXiv:1802.09089. 2018. DOI:10.48550/arXiv.1802.09089</mixed-citation></citation-alternatives></ref><ref id="cit14"><label>14</label><citation-alternatives><mixed-citation xml:lang="ru">Miyamoto K., Goto H., Ishibashi R., Han C., Ban T., Takahashi, et al. Malicious Packet Classification Based on Neural Network Using Kitsune Features // Proceedings of the Second International Conference on Intelligent Systems and Pattern Recognition (ISPR 2022, Hammamet, Tunisia, 24–26 March 2022). Communications in Computer and Information Science. Cham: Springer; 2022. Vol. 1589. PP. 306–314. DOI:10.1007/978-3-031-08277-1_25</mixed-citation><mixed-citation xml:lang="en">Miyamoto K., Goto H., Ishibashi R., Han C., Ban T., Takahashi, et al. Malicious Packet Classification Based on Neural Network Using Kitsune Features. Proceedings of the Second International Conference on Intelligent Systems and Pattern Recognition, ISPR 2022, 24–26 March 2022, Hammamet, Tunisia. Communications in Computer and Information Science, vol.1589. Cham: Springer; 2022. p.306–314. DOI:10.1007/978-3-031-08277-1_25</mixed-citation></citation-alternatives></ref><ref id="cit15"><label>15</label><citation-alternatives><mixed-citation xml:lang="ru">Alabdulatif A., Rizvi S.S.H. Machine Learning Approach for Improvement in Kitsune NID // Intelligent Automation &amp; Soft Computing. 2022. Vol. 32. Iss. 2. PP. 827‒840. DOI:10.32604/iasc.2022.021879</mixed-citation><mixed-citation xml:lang="en">Alabdulatif A., Rizvi S.S.H. Machine Learning Approach for Improvement in Kitsune NID. Intelligent Automation &amp; Soft Computing. 2022;32(2):827‒840. DOI:10.32604/iasc.2022.021879</mixed-citation></citation-alternatives></ref></ref-list><fn-group><fn fn-type="conflict"><p>The authors declare that there are no conflicts of interest present.</p></fn></fn-group></back></article>
