Volume Based Anomaly Detection using LRD Analysis of Decomposed Network Traffic

被引:0
|
作者
Zeb, Khan [1 ]
AsSadhan, Basil [1 ]
Al-Muhtadi, Jalal [2 ]
Alshebeili, Saleh [1 ,3 ]
Bashaiwth, Abdulmuneem [1 ]
机构
[1] King Saud Univ, Dept Elect Engn, Coll Engn, Riyadh, Saudi Arabia
[2] King Saud Univ, Dept Comp Sci, Coll Comp & Informat Sc, Riyadh, Saudi Arabia
[3] King Saud Univ, KACST TIC RF & Photon E Soc RFTONICS, Riyadh, Saudi Arabia
关键词
LRD; self-similarity; traffic analysis; control and data planes traffic; anomaly detection; Optimization method; SELF-SIMILARITY; BEHAVIOR;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Network traffic intrusions increase day by day in computer systems. This poses major security threats to computer networks. In this paper, we present an effective approach for anomaly detection in network traffic. We investigate the long-range dependence (LRD) behavior of decomposed network traffic subgroups in different directions with respect the enterprise network. If the network traffic exhibits LRD behavior during normal conditions, then deviation from this property can indicate an abnormality in the traffic. We analyze and evaluate recent Internet traffic captured at King Saud University (KSU). The results and analysis of the proposed approach show that the presence of short duration anomalies affect the LRD behavior of certain traffic subgroups, namely the subgroups in the control plane traffic while the aggregated whole traffic still exhibits LRD. These results show how this approach significantly reduces the amount of traffic to analyze, and more importantly it can detect abnormal behavior that is not detected when looking the traffic as a whole.
引用
收藏
页码:52 / 57
页数:6
相关论文
共 50 条
  • [21] Distribution-based anomaly detection in network traffic
    Coluccia, Angelo
    D'Alconzo, Alessandro
    Ricciato, Fabio
    Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2013, 7754 : 202 - 216
  • [22] PCA-Based Network Traffic Anomaly Detection
    Meimei Ding
    Hui Tian
    TsinghuaScienceandTechnology, 2016, 21 (05) : 500 - 509
  • [23] Network Traffic Anomaly Detection based on Apache Spark
    Pwint, Phyo Htet
    Shwe, Thanda
    2019 INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION TECHNOLOGIES (ICAIT), 2019, : 222 - 226
  • [24] Anomaly detection of network traffic based on wavelet packet
    Gao, Jun
    Hu, Guangmin
    Yao, Xingmiao
    Chang, Rocky K. C.
    2006 ASIA-PACIFIC CONFERENCE ON COMMUNICATION, VOLS 1 AND 2, 2006, : 660 - 664
  • [25] Anomaly detection based on the dynamic feature of network traffic
    Zhang, Yaxing
    Jin, Shuyuan
    Wang, Yuanzhuo
    Wang, Yanxia
    ADVANCES IN ENERGY, ENVIRONMENT AND MATERIALS SCIENCE, 2016, : 781 - 789
  • [26] Network Traffic Anomaly Detection based on Catastrophe Theory
    Xiong, Wei
    Xiong, Naixue
    Yang, Laurence T.
    Vasilakos, Athanasios V.
    Wang, Qian
    Hu, Hanping
    2010 IEEE GLOBECOM WORKSHOPS, 2010, : 2070 - 2074
  • [27] PCA-Based Network Traffic Anomaly Detection
    Ding, Meimei
    Tian, Hui
    TSINGHUA SCIENCE AND TECHNOLOGY, 2016, 21 (05) : 500 - 509
  • [28] Network Traffic Anomaly Detection Based on Self-similarity Using FRFT
    Ye, Xiaolong
    Lan, Julong
    Huang, Wanwei
    PROCEEDINGS OF 2013 IEEE 4TH INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING AND SERVICE SCIENCE (ICSESS), 2012, : 837 - 840
  • [29] Network traffic analysis over clustering-based collective anomaly detection
    Wang, Chonghua
    Zhou, Hao
    Hao, Zhiqiang
    Hu, Shu
    Li, Jun
    Zhang, Xueying
    Jiang, Bo
    Chen, Xuehong
    COMPUTER NETWORKS, 2022, 205
  • [30] An Anomaly Detection and Analysis Method for Network Traffic Based on Correlation Coefficient Matrix
    Chen, Ning
    Chen, Xiao-Su
    Xiong, Bing
    Lu, Hong-Wei
    2009 INTERNATIONAL CONFERENCE ON SCALABLE COMPUTING AND COMMUNICATIONS & EIGHTH INTERNATIONAL CONFERENCE ON EMBEDDED COMPUTING, 2009, : 238 - 244