A Taxonomy of Anomalies in Backbone Network Traffic

被引:0
|
作者
Mazel, Johan
Fontugne, Romain
Fukuda, Kensuke
机构
来源
2014 INTERNATIONAL WIRELESS COMMUNICATIONS AND MOBILE COMPUTING CONFERENCE (IWCMC) | 2014年
关键词
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
The potential threat of network anomalies on Internet has led to a constant effort by the research community to design reliable detection methods. Detection is not enough, however, because network administrators need additional information on the nature of events occurring in a network. Several works try to classify detected events or establish a taxonomy of known events. But, these works are non-overlapping in terms of anomaly type coverage. On the one hand, existing classification methods use a limited set of labels. On the other hand, taxonomies often target a single type of anomaly or, when they have wider scope, fail to present the full spectrum of what really happens in the wild. We thus present a new taxonomy of network anomalies with wide coverage of existing work. We also provide a set of signatures that assign taxonomy labels to events. We present a preliminary study applying this taxonomy with six years of real network traffic from the MAWI repository. We classify previously documented anomalous events and draw to main conclusions. First, the taxonomy-based analysis provides new insights regarding events previous classified by heuristic rule labeling. For example, some RST events are now classified as network scan response and the majority of ICMP events are split into network scans and network scan responses. Moreover, some previously unknown events now account for a substantial number of all UDP network scans, network scan responses and port scans. Second, the number of unknown events decreases from 20 to 10% of all events with the proposed taxonomy as compared to the heuristic approach.
引用
收藏
页码:30 / 36
页数:7
相关论文
共 50 条
  • [31] Security Requirements Planning To Anticipate The Traffic Flooding On The Backbone Network
    Haryadi, Sigit
    Ibrahim, Jordia
    Proceeding of 2015 1st International Conference on Wireless and Telematics (ICWT), 2015,
  • [32] Modeling heterogeneity in an open percolation backbone fractal traffic network
    Verma, Muskan
    Sharma, Sapna
    PHYSICA A-STATISTICAL MECHANICS AND ITS APPLICATIONS, 2023, 619
  • [33] HADOOP-BASED NETWORK TRAFFIC ANOMALY DETECTION IN BACKBONE
    Yu, Jishen
    Liu, Feng
    Zhou, Wenli
    Yu, Hua
    2014 IEEE 3rd International Conference on Cloud Computing and Intelligence Systems (CCIS), 2014, : 140 - 145
  • [34] A mechanism for admission control of the input traffic to the UMTS backbone network
    De Alecrim, PD
    Guardiciro, PR
    2005 13th IEEE International Conference on Networks Jointly held with the 2005 7th IEEE Malaysia International Conference on Communications, Proceedings 1 and 2, 2005, : 823 - 827
  • [35] Traffic characterization of network attack flows on the Internet backbone links
    Jeon, YJ
    Roh, BH
    Yoo, SW
    Kim, JS
    IC'04: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON INTERNET COMPUTING, VOLS 1 AND 2, 2004, : 335 - 338
  • [36] A methodology for analyzing backbone network traffic at stream-level
    He, T
    Zhang, H
    Li, X
    Li, ZC
    2003 INTERNATIONAL CONFERENCE ON COMMUNICATION TECHNOLOGY, VOL 1 AND 2, PROCEEDINGS, 2003, : 98 - 102
  • [37] Network traffic anomalies detection and identification with flow monitoring
    Nguyen, Huy Anh
    Nguyen, Tam Van
    Kim, Dong Il
    Choi, Deokjai
    2008 IFIP INTERNATIONAL CONFERENCE ON WIRELESS AND OPTICAL COMMUNICATIONS NETWORKS, 2008, : 235 - +
  • [38] Uncovering network traffic anomalies based on their sparse distributions
    GuoZhen Cheng
    HongChang Chen
    DongNian Cheng
    Zhen Zhang
    JuLong Lan
    Science China Information Sciences, 2014, 57 : 1 - 11
  • [39] Uncovering network traffic anomalies based on their sparse distributions
    CHENG GuoZhen
    CHEN HongChang
    CHENG DongNian
    ZHANG Zhen
    LAN JuLong
    Science China(Information Sciences), 2014, 57 (09) : 256 - 266
  • [40] Using Machine Learning to Analyze Network Traffic Anomalies
    Khudoyarova, Anastasia
    Burlakov, Mikhail
    Kupriyashin, Mikhail
    PROCEEDINGS OF THE 2021 IEEE CONFERENCE OF RUSSIAN YOUNG RESEARCHERS IN ELECTRICAL AND ELECTRONIC ENGINEERING (ELCONRUS), 2021, : 2344 - 2348