A Taxonomy of Anomalies in Backbone Network Traffic

被引:0
|
作者
Mazel, Johan
Fontugne, Romain
Fukuda, Kensuke
机构
来源
2014 INTERNATIONAL WIRELESS COMMUNICATIONS AND MOBILE COMPUTING CONFERENCE (IWCMC) | 2014年
关键词
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
The potential threat of network anomalies on Internet has led to a constant effort by the research community to design reliable detection methods. Detection is not enough, however, because network administrators need additional information on the nature of events occurring in a network. Several works try to classify detected events or establish a taxonomy of known events. But, these works are non-overlapping in terms of anomaly type coverage. On the one hand, existing classification methods use a limited set of labels. On the other hand, taxonomies often target a single type of anomaly or, when they have wider scope, fail to present the full spectrum of what really happens in the wild. We thus present a new taxonomy of network anomalies with wide coverage of existing work. We also provide a set of signatures that assign taxonomy labels to events. We present a preliminary study applying this taxonomy with six years of real network traffic from the MAWI repository. We classify previously documented anomalous events and draw to main conclusions. First, the taxonomy-based analysis provides new insights regarding events previous classified by heuristic rule labeling. For example, some RST events are now classified as network scan response and the majority of ICMP events are split into network scans and network scan responses. Moreover, some previously unknown events now account for a substantial number of all UDP network scans, network scan responses and port scans. Second, the number of unknown events decreases from 20 to 10% of all events with the proposed taxonomy as compared to the heuristic approach.
引用
收藏
页码:30 / 36
页数:7
相关论文
共 50 条
  • [21] Greening the Optical Backbone Network: a Traffic Engineering Approach
    Xia, Ming
    Tornatore, Massimo
    Zhang, Yi
    Chowdhury, Pulak
    Martel, Charles
    Mukherjee, Biswanath
    2010 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS, 2010,
  • [22] Look at my Network: An insight into the ISP Backbone Traffic
    Benes, Tomas
    Pesek, Jaroslav
    Cejka, Tomas
    2023 19TH INTERNATIONAL CONFERENCE ON NETWORK AND SERVICE MANAGEMENT, CNSM, 2023,
  • [23] A Method of Detecting Network Anomalies in Cyclic Traffic
    Harada, Shigeaki
    Kawahara, Ryoichi
    Mori, Tatsuya
    Kamiyama, Noriaki
    Hasegawa, Haruhisa
    Yoshino, Hideaki
    GLOBECOM 2008 - 2008 IEEE GLOBAL TELECOMMUNICATIONS CONFERENCE, 2008,
  • [24] Diagnosing network-wide traffic anomalies
    Lakhina, A
    Crovella, M
    Diot, C
    ACM SIGCOMM COMPUTER COMMUNICATION REVIEW, 2004, 34 (04) : 219 - 230
  • [25] Predicting Network Traffic Using TCP Anomalies
    Lazar, Alina
    Wu, Kesheng
    Sim, Alex
    2018 IEEE INTERNATIONAL CONFERENCE ON BIG DATA (BIG DATA), 2018, : 5369 - 5371
  • [26] On the Detection of Network Traffic Anomalies in Content Delivery Network Services
    Fiadino, Pierdomenico
    D'Alconzo, Alessandro
    Baer, Arian
    Finamore, Alessandro
    Casas, Pedro
    2014 26TH INTERNATIONAL TELETRAFFIC CONGRESS (ITC), 2014,
  • [27] Network Services Anomalies in NFV: Survey, Taxonomy, and Verification Methods
    Zoure, Moubarak
    Ahmed, Toufik
    Reveillere, Laurent
    IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT, 2022, 19 (02): : 1567 - 1584
  • [28] Backbone Network Traffic Prediction Based on Modified EEMD and Quantum Neural Network
    Huang, Wanwei
    Zhang, Jianwei
    Liang, Shujun
    Sun, Haiyan
    WIRELESS PERSONAL COMMUNICATIONS, 2018, 99 (04) : 1569 - 1588
  • [29] Backbone Network Traffic Prediction Based on Modified EEMD and Quantum Neural Network
    Wanwei Huang
    Jianwei Zhang
    Shujun Liang
    Haiyan Sun
    Wireless Personal Communications, 2018, 99 : 1569 - 1588
  • [30] A new approach for detecting abnormal email traffic in backbone network
    Zhang, Ni
    Fang, BinXing
    Guo, Li
    Jiang, Yu
    2006 INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY, PTS 1 AND 2, PROCEEDINGS, 2006, : 586 - 591