Detecting anomalies in backbone network traffic: a performance comparison among several change detection methods

被引:0
|
作者
Callegari, Christian [1 ]
Giordano, Stefano [1 ]
Pagano, Michele [1 ]
Pepe, Teresa [1 ]
机构
[1] Univ Pisa, Dept Informat Engn, Pisa, Italy
关键词
anomaly detection; reversible sketch; heavy hitter; heavy change; multi-chart non-parametric CUSUM algorithm; ALGORITHMS; ATTACKS;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In the last years, the ever increasing number of network attacks has brought the research attention to the design and development of effective anomaly detection systems. To this aim, the main target is to develop efficient algorithms able to detect abrupt changes in the data, with the smallest detection delay. In this paper, we present a novel method for network anomaly detection, based on the idea of discovering heavy change (HC) in the distribution of the Heavy I-litters in the network traffic, by applying several forecasting algorithms. To assess the validity of the proposed method, we have performed an experimental evaluation phase, during which our system performance have been compared to more 'classical' approaches, such as a standard HC method and the promising CUSUM method. The performance analysis, presented in this paper, demonstrates the effectiveness of the proposed method, showing how it is able to outperform the 'classical' approaches.
引用
收藏
页码:205 / 214
页数:10
相关论文
共 50 条
  • [31] Comparison of Pixel-based Change Detection Methods for Detecting Changes on Small Objects
    Seo, Junghoon
    Park, Wonkyu
    Kim, Taejung
    KOREAN JOURNAL OF REMOTE SENSING, 2021, 37 (02) : 177 - 198
  • [32] Online Detection of Network Traffic Anomalies Using Behavioral Distance
    Sengar, Hemant
    Wang, Xinyuan
    Wang, Haining
    Wijesekera, Duminda
    Jajodia, Sushil
    IWQOS: 2009 IEEE 17TH INTERNATIONAL WORKSHOP ON QUALITY OF SERVICE, 2009, : 91 - +
  • [33] Real-time detection method for network traffic anomalies
    Zou, Bai-Xian
    Jisuanji Xuebao/Chinese Journal of Computers, 2003, 26 (08): : 940 - 947
  • [34] Using Traffic Self-Similarity for Network Anomalies Detection
    Popa, Sorin Mihai
    Manea, George Marian
    2015 20TH INTERNATIONAL CONFERENCE ON CONTROL SYSTEMS AND COMPUTER SCIENCE, 2015, : 639 - 644
  • [35] Detection and analysis of cellular network traffic anomalies and SMS spammers
    Sandhya, B. S.
    Deshpande, Rohini
    JOURNAL OF ELECTRICAL SYSTEMS, 2024, 20 (03) : 685 - 700
  • [36] An information-theoretic method for the detection of anomalies in network traffic
    Callegari, Christian
    Giordano, Stefano
    Pagano, Michele
    COMPUTERS & SECURITY, 2017, 70 : 351 - 365
  • [37] Network traffic anomalies detection using Lipschitz singularity exponents
    Xu, Xiaodong
    Zhu, Shirui
    Sun, Yamin
    Journal of Information and Computational Science, 2008, 5 (04): : 1527 - 1533
  • [38] A Comparison of Traffic Operations among Beijing and Several International Megacities
    Yang, Yuanzhou
    Yang, Jing
    Mao, Baohua
    Chen, Shaokuan
    Guo, Hongwei
    INTERNATIONAL JOURNAL OF COMPUTATIONAL INTELLIGENCE SYSTEMS, 2011, 4 (06) : 1391 - 1400
  • [39] A Comparison of Traffic Operations among Beijing and Several International Megacities
    Yang Y.
    Yang J.
    Mao B.
    Chen S.
    Guo H.
    International Journal of Computational Intelligence Systems, 2011, 4 (6) : 1391 - 1400
  • [40] Comparison on the Performance of Several Outlier Detection Methods in Univariate Circular Wrapped Normal Sample
    Zulkipli, Nur Syahirah
    Rambli, Adzhar
    2ND INTERNATIONAL CONFERENCE ON APPLIED & INDUSTRIAL MATHEMATICS AND STATISTICS, 2019, 1366