A Taxonomy of Anomalies in Backbone Network Traffic

被引:0
|
作者
Mazel, Johan
Fontugne, Romain
Fukuda, Kensuke
机构
来源
2014 INTERNATIONAL WIRELESS COMMUNICATIONS AND MOBILE COMPUTING CONFERENCE (IWCMC) | 2014年
关键词
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
The potential threat of network anomalies on Internet has led to a constant effort by the research community to design reliable detection methods. Detection is not enough, however, because network administrators need additional information on the nature of events occurring in a network. Several works try to classify detected events or establish a taxonomy of known events. But, these works are non-overlapping in terms of anomaly type coverage. On the one hand, existing classification methods use a limited set of labels. On the other hand, taxonomies often target a single type of anomaly or, when they have wider scope, fail to present the full spectrum of what really happens in the wild. We thus present a new taxonomy of network anomalies with wide coverage of existing work. We also provide a set of signatures that assign taxonomy labels to events. We present a preliminary study applying this taxonomy with six years of real network traffic from the MAWI repository. We classify previously documented anomalous events and draw to main conclusions. First, the taxonomy-based analysis provides new insights regarding events previous classified by heuristic rule labeling. For example, some RST events are now classified as network scan response and the majority of ICMP events are split into network scans and network scan responses. Moreover, some previously unknown events now account for a substantial number of all UDP network scans, network scan responses and port scans. Second, the number of unknown events decreases from 20 to 10% of all events with the proposed taxonomy as compared to the heuristic approach.
引用
收藏
页码:30 / 36
页数:7
相关论文
共 50 条
  • [41] Uncovering network traffic anomalies based on their sparse distributions
    Cheng GuoZhen
    Chen HongChang
    Cheng DongNian
    Zhang Zhen
    Lan JuLong
    SCIENCE CHINA-INFORMATION SCIENCES, 2014, 57 (09) : 1 - 11
  • [42] Network traffic anomalies automatic detection in DDoS attacks
    Orekhov, Andrey V.
    Orekhov, Aleksey A.
    VESTNIK SANKT-PETERBURGSKOGO UNIVERSITETA SERIYA 10 PRIKLADNAYA MATEMATIKA INFORMATIKA PROTSESSY UPRAVLENIYA, 2023, 19 (02): : 251 - 263
  • [43] Reducing Virtual Network Reconfiguration and Traffic Losses under Multiple Traffic Anomalies
    Vela, Alba P.
    Ruiz, Marc
    Velasco, Luis
    2016 ASIA COMMUNICATIONS AND PHOTONICS CONFERENCE (ACP), 2016,
  • [44] Analysis of network traffic characteristic in IP network backbone based on weighted map model
    Institute of Command Automation, PLA Univ. of Sci. and Tech., Nanjing 210007, China
    Xitong Fangzhen Xuebao, 2008, 4 (888-891+930):
  • [45] Network Traffic Prediction Based on Deep Belief Network in Wireless Mesh Backbone Networks
    Nie, Laisen
    Jiang, Dingde
    Yu, Shui
    Song, Houbing
    2017 IEEE WIRELESS COMMUNICATIONS AND NETWORKING CONFERENCE (WCNC), 2017,
  • [46] Research on Framework of Network Protocol Taxonomy Oriented to Traffic Classification
    Qian, Liping
    Wang, Lidong
    PROCEEDINGS OF THE 2013 ASIA-PACIFIC COMPUTATIONAL INTELLIGENCE AND INFORMATION TECHNOLOGY CONFERENCE, 2013, : 714 - 720
  • [47] Traffic dimensioning for an ATM backbone network - development of an ATM-BBN traffic dimensioning system
    Nakanishi, Hironobu
    Yokoi, Hirofumi
    NTT R and D, 1999, 48 (09): : 688 - 696
  • [48] Some results on estimation & modeling of switch transit traffic in a backbone network
    Devi, BB
    7TH INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATIONS AND NETWORKS - PROCEEDINGS, 1998, : 905 - 909
  • [49] A COMPARISON of FDD and TDD/TDMA ARCHITECTURES for AIRBORNE BACKBONE NETWORK TRAFFIC
    Adams, Stanley
    Cain, Bibb
    Olds, Keith
    Griessler, Pete
    2008 IEEE MILITARY COMMUNICATIONS CONFERENCE: MILCOM 2008, VOLS 1-7, 2008, : 2868 - 2874
  • [50] On the Large-scale Traffic DDoS Threat of Space Backbone Network
    Ao, Di
    Shi, Ruisheng
    Lan, Lina
    Lu, Yueming
    2019 IEEE 5TH INTL CONFERENCE ON BIG DATA SECURITY ON CLOUD (BIGDATASECURITY) / IEEE INTL CONFERENCE ON HIGH PERFORMANCE AND SMART COMPUTING (HPSC) / IEEE INTL CONFERENCE ON INTELLIGENT DATA AND SECURITY (IDS), 2019, : 192 - 194