Predictive Network Anomaly Detection and Visualization

被引:23
|
作者
Celenk, Mehmet [1 ]
Conley, Thomas [1 ]
Willis, John [1 ]
Graham, James [1 ]
机构
[1] Ohio Univ, Sch Elect Engn & Comp Sci, Stocker Ctr, Athens, OH 45701 USA
关键词
Auto-regressive moving average (ARMA) modeling; entropy; Fisher discriminant; network anomaly; Wiener filtering; TRAFFIC ANOMALIES; PERIODOGRAM;
D O I
10.1109/TIFS.2010.2041808
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Various approaches have been developed for quantifying and displaying network traffic information for determining network status and in detecting anomalies. Although many of these methods are effective, they rely on the collection of long-term network statistics. Here, we present an approach that uses short-term observations of network features and their respective time averaged entropies. Acute changes are localized in network feature space using adaptive Wiener filtering and auto-regressive moving average modeling. The color-enhanced datagram is designed to allow a network engineer to quickly capture and visually comprehend at a glance the statistical characteristics of a network anomaly. First, average entropy for each feature is calculated for every second of observation. Then, the resultant short-term measurement is subjected to first-and second-order time averaging statistics. These measurements are the basis of a novel approach to anomaly estimation based on the well-known Fisher linear discriminant (FLD). Average port, high port, server ports, and peered ports are some of the network features used for stochastic clustering and filtering. We empirically determine that these network features obey Gaussian-like distributions. The proposed algorithm is tested on real-time network traffic data from Ohio University's main Internet connection. Experimentation has shown that the presented FLD-based scheme is accurate in identifying anomalies in network feature space, in localizing anomalies in network traffic flow, and in helping network engineers to prevent potential hazards. Furthermore, its performance is highly effective in providing a colorized visualization chart to network analysts in the presence of bursty network traffic.
引用
收藏
页码:288 / 299
页数:12
相关论文
共 50 条
  • [41] WFNN Trained by for Network Anomaly Detection
    Liu, Yuan
    [J]. THIRD INTERNATIONAL SYMPOSIUM ON ELECTRONIC COMMERCE AND SECURITY WORKSHOPS (ISECS 2010), 2010, : 207 - 210
  • [42] A Lightweight Network Anomaly Detection Technique
    Kim, Jinoh
    Yoo, Wucherl
    Sim, Alex
    Suh, Sang C.
    Kim, Ikkyun
    [J]. 2017 INTERNATIONAL CONFERENCE ON COMPUTING, NETWORKING AND COMMUNICATIONS (ICNC), 2016, : 896 - 900
  • [43] Network Performance Anomaly Detection and Localization
    Barford, Paul
    Duffield, Nick
    Ron, Amos
    Sommers, Joel
    [J]. IEEE INFOCOM 2009 - IEEE CONFERENCE ON COMPUTER COMMUNICATIONS, VOLS 1-5, 2009, : 1377 - +
  • [44] Anomaly Detection using Network Metadata
    Mutmbak, Khaled
    Alotaibi, Sultan
    Alharbi, Khalid
    Albalawi, Umar
    Younes, Osama
    [J]. INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2022, 13 (05) : 809 - 814
  • [45] Neural Network based Anomaly Detection
    Callegari, Christian
    Giordano, Stefano
    Pagano, Michele
    [J]. 2014 IEEE 19TH INTERNATIONAL WORKSHOP ON COMPUTER AIDED MODELING AND DESIGN OF COMMUNICATION LINKS AND NETWORKS (CAMAD), 2014, : 310 - 314
  • [46] Anomaly Detection for Mobile Network Management
    Wang, MingXue
    Handurukande, Sidath
    [J]. INTERNATIONAL JOURNAL OF NEXT-GENERATION COMPUTING, 2018, 9 (02): : 80 - 98
  • [47] A survey of network anomaly detection techniques
    Ahmed, Mohiuddin
    Mahmood, Abdun Naser
    Hu, Jiankun
    [J]. JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2016, 60 : 19 - 31
  • [48] Anomaly Detection with Artificial Immune Network
    PENG Lingxi1
    2. School of Information
    [J]. Wuhan University Journal of Natural Sciences, 2007, (05) : 951 - 954
  • [49] Greedy Algorithms for Network Anomaly Detection
    Andrysiak, Tomasz
    Saganowski, Lukasz
    Choras, Michal
    [J]. INTERNATIONAL JOINT CONFERENCE CISIS'12 - ICEUTE'12 - SOCO'12 SPECIAL SESSIONS, 2013, 189 : 235 - 244
  • [50] On ubiquitous network security and anomaly detection
    Van Dyke, C
    Koc, CK
    [J]. 2003 SYMPOSIUM ON APPLICATIONS AND THE INTERNET WORKSHOPS, PROCEEDINGS, 2003, : 374 - 378