Promising Techniques for Anomaly Detection on Network Traffic

被引:0
|
作者
Tian, Hui [1 ,2 ]
Liu, Jingtian [1 ]
Ding, Meimei [1 ]
机构
[1] Beijing Jiaotong Univ, Sch Elect & Informat Engn, Beijing, Peoples R China
[2] Univ Adelaide, Sch Comp Sci, Adelaide, SA, Australia
基金
澳大利亚研究理事会;
关键词
diffusion wavelet; principal component analysis; anomaly detection; WAVELET-BASED ANALYSIS;
D O I
10.2298/CSIS170201018H
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In various networks, anomaly may happen due to network breakdown, intrusion detection, and end-to-end traffic changes. To detect these anomalies is important in diagnosis, fault report, capacity plan and so on. However, it's challenging to detect these anomalies with high accuracy rate and time efficiency. Existing works are mainly classified into two streams, anomaly detection on link traffic and on global traffic. In this paper we discuss various anomaly detection methods on both types of traffic and compare their performance.
引用
收藏
页码:597 / 609
页数:13
相关论文
共 50 条
  • [1] Collective Anomaly Detection Techniques for Network Traffic Analysis
    Ahmed M.
    [J]. Annals of Data Science, 2018, 5 (4) : 497 - 512
  • [2] Anomaly detection in network traffic
    Duraj, Agnieszka
    Bucki, Pawel
    Drajling, Aleksander
    Makrocki, Robert
    Sipinski, Mateusz
    [J]. PRZEGLAD ELEKTROTECHNICZNY, 2022, 98 (12): : 205 - 208
  • [3] NETWORK TRAFFIC ANOMALY DETECTION USING CLUSTERING TECHNIQUES AND PERFORMANCE COMPARISON
    Liu, Duo
    Lung, Chung-Horng
    Lambadaris, Ioannis
    Seddigh, Nabil
    [J]. 2013 26TH ANNUAL IEEE CANADIAN CONFERENCE ON ELECTRICAL AND COMPUTER ENGINEERING (CCECE), 2013, : 345 - 348
  • [4] Hybrid Approach for Detection of Anomaly Network Traffic using Data Mining Techniques
    Agarwal, Basant
    Mittal, Namita
    [J]. 2ND INTERNATIONAL CONFERENCE ON COMMUNICATION, COMPUTING & SECURITY [ICCCS-2012], 2012, 1 : 996 - 1003
  • [5] Anomaly detection in symmetric network traffic
    Yu, Ming
    Zhou, Xi-Yuan
    [J]. WSEAS Transactions on Information Science and Applications, 2007, 4 (09): : 1360 - 1364
  • [6] Anomaly detection for network traffic flow
    Shan, Rongsheng
    Li, Jianhua
    Wang, Mingzheng
    [J]. Journal of Southeast University (English Edition), 2004, 20 (01) : 16 - 20
  • [7] A survey of network anomaly detection techniques
    Ahmed, Mohiuddin
    Mahmood, Abdun Naser
    Hu, Jiankun
    [J]. JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2016, 60 : 19 - 31
  • [8] Network Anomaly Detection based on Traffic Prediction
    Wang, Fengyu
    Gong, Bin
    Hu, Yi
    Zhang, Ningbo
    [J]. 2009 INTERNATIONAL CONFERENCE ON SCALABLE COMPUTING AND COMMUNICATIONS & EIGHTH INTERNATIONAL CONFERENCE ON EMBEDDED COMPUTING, 2009, : 449 - 454
  • [9] Analysis of network traffic features for anomaly detection
    Iglesias, Felix
    Zseby, Tanja
    [J]. MACHINE LEARNING, 2015, 101 (1-3) : 59 - 84
  • [10] A BasisEvolution framework for network traffic anomaly detection
    Xia, Hui
    Fang, Bin
    Roughan, Matthew
    Cho, Kenjiro
    Tune, Paul
    [J]. COMPUTER NETWORKS, 2018, 135 : 15 - 31