Detecting anomalies in backbone network traffic: a performance comparison among several change detection methods

被引:0
|
作者
Callegari, Christian [1 ]
Giordano, Stefano [1 ]
Pagano, Michele [1 ]
Pepe, Teresa [1 ]
机构
[1] Univ Pisa, Dept Informat Engn, Pisa, Italy
关键词
anomaly detection; reversible sketch; heavy hitter; heavy change; multi-chart non-parametric CUSUM algorithm; ALGORITHMS; ATTACKS;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In the last years, the ever increasing number of network attacks has brought the research attention to the design and development of effective anomaly detection systems. To this aim, the main target is to develop efficient algorithms able to detect abrupt changes in the data, with the smallest detection delay. In this paper, we present a novel method for network anomaly detection, based on the idea of discovering heavy change (HC) in the distribution of the Heavy I-litters in the network traffic, by applying several forecasting algorithms. To assess the validity of the proposed method, we have performed an experimental evaluation phase, during which our system performance have been compared to more 'classical' approaches, such as a standard HC method and the promising CUSUM method. The performance analysis, presented in this paper, demonstrates the effectiveness of the proposed method, showing how it is able to outperform the 'classical' approaches.
引用
收藏
页码:205 / 214
页数:10
相关论文
共 50 条
  • [1] Detecting Network Anomalies in Backbone Networks
    Callegari, Christian
    Gazzarrini, Loris
    Giordano, Stefano
    Pagano, Michele
    Pepe, Teresa
    RECENT ADVANCES IN INTRUSION DETECTION, 2010, 6307 : 490 - 491
  • [2] Detecting and tracing traffic volume anomalies in SINET3 backbone network
    Du, Ping
    Abe, Shunji
    Ji, Yusheng
    Sato, Seishou
    Ishiguro, Makio
    2008 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS, PROCEEDINGS, VOLS 1-13, 2008, : 5833 - +
  • [3] A Taxonomy of Anomalies in Backbone Network Traffic
    Mazel, Johan
    Fontugne, Romain
    Fukuda, Kensuke
    2014 INTERNATIONAL WIRELESS COMMUNICATIONS AND MOBILE COMPUTING CONFERENCE (IWCMC), 2014, : 30 - 36
  • [4] Comparison of Supervised and Unsupervised Learning for Detecting Anomalies in Network Traffic
    McAndrew, Robert
    Hayne, Stephen
    Wang, Haonan
    PROCEEDINGS OF THE 52ND ANNUAL HAWAII INTERNATIONAL CONFERENCE ON SYSTEM SCIENCES, 2019, : 7136 - 7145
  • [5] Detecting Network Performance Anomalies with Contextual Anomaly Detection
    Dimopoulos, Giorgos
    Barlet-Ros, Pere
    Dovrolis, Constantine
    Leontiadis, Ilias
    2017 IEEE INTERNATIONAL WORKSHOP ON MEASUREMENT AND NETWORKING (M&N), 2017, : 268 - 273
  • [6] Wavelet methods for the detection of anomalies and their application to network traffic analysis
    Kwon, D. W.
    Ko, K.
    Vannucci, M.
    Reddy, A. L. N.
    Kim, S.
    QUALITY AND RELIABILITY ENGINEERING INTERNATIONAL, 2006, 22 (08) : 953 - 969
  • [7] A Method of Detecting Network Anomalies in Cyclic Traffic
    Harada, Shigeaki
    Kawahara, Ryoichi
    Mori, Tatsuya
    Kamiyama, Noriaki
    Hasegawa, Haruhisa
    Yoshino, Hideaki
    GLOBECOM 2008 - 2008 IEEE GLOBAL TELECOMMUNICATIONS CONFERENCE, 2008,
  • [8] Research and Comparison of Several Vehicle Detection Methods in Urban Traffic Scenes
    Qi, Xing-Zhi
    Feng, Chun-Fang
    Dong, Ke-Ran
    CICTP 2019: TRANSPORTATION IN CHINA-CONNECTING THE WORLD, 2019, : 2445 - 2456
  • [9] Detecting anomalies from big network traffic data using an adaptive detection approach
    Zhang, Ji
    Li, Hongzhou
    Gao, Qigang
    Wang, Hai
    Luo, Yonglong
    INFORMATION SCIENCES, 2015, 318 : 91 - 110
  • [10] A new approach for detecting abnormal email traffic in backbone network
    Zhang, Ni
    Fang, BinXing
    Guo, Li
    Jiang, Yu
    2006 INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY, PTS 1 AND 2, PROCEEDINGS, 2006, : 586 - 591