Matrix Profile data mining for BGP anomaly detection

被引:6
|
作者
Scott, Ben A. [1 ]
Johnstone, Michael N. [1 ]
Szewczyk, Patryk [1 ]
Richardson, Steven [1 ]
机构
[1] Edith Cowan Univ, Perth, Australia
关键词
Anomaly detection; BGP; Cyber security; Internet security; Network security; Routing; Time series analysis;
D O I
10.1016/j.comnet.2024.110257
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
The Border Gateway Protocol (BGP), acting as the communication protocol that binds the Internet, remains vulnerable despite Internet security advancements. This is not surprising, as the Internet was not designed to be resilient to cyber-attacks, therefore the detection of anomalous activity was not of prime importance to the Internet creators. Detection of BGP anomalies can potentially provide network operators with an early warning system to focus on protecting networks, systems, and infrastructure from significant impact, improve security posture and resilience, while ultimately contributing to a secure global Internet environment. In this paper, we present a novel technique for the detection of BGP anomalies in different events. This research uses publicly available datasets of BGP messages collected from the repositories, Route Views and Reseaux IP Europeens (RIPE). Our contribution is the application of a time series data mining approach, Matrix Profile (MP), to detect BGP anomalies in all categories of BGP events. Advantages of the MP detection technique compared to extant approaches include that it is domain agnostic, is assumption -free, requires few parameters, does not require training data, and is scalable and storage efficient. The single hyper -parameter analyzed in MP shows it is robust to change. Our results indicate the MP detection scheme is competitive against existing detection schemes. A novel BGP anomaly detection scheme is also proposed for further research and validation.
引用
收藏
页数:13
相关论文
共 50 条
  • [22] The Research of Network Anomaly Detection Technology Based on Data Mining
    Wu, Chunhong
    Xia, Wenzhong
    Liu, Fengyun
    PROCEEDINGS OF THE 2015 2ND INTERNATIONAL CONFERENCE ON ELECTRICAL, COMPUTER ENGINEERING AND ELECTRONICS (ICECEE 2015), 2015, 24 : 1689 - 1692
  • [23] Anomaly detection scheme using data mining in mobile environment
    Park, K
    Ryou, H
    COMPUTATIONAL SCIENCE AND ITS APPLICATIONS - ICCSA 2003, PT 2, PROCEEDINGS, 2003, 2668 : 21 - 30
  • [24] The Key Techniques of the Network Anomaly Detection Based on Data Mining
    He Xiaobo
    PROCEEDINGS OF THE 2015 INTERNATIONAL CONFERENCE ON INTELLIGENT SYSTEMS RESEARCH AND MECHATRONICS ENGINEERING, 2015, 121 : 1896 - 1899
  • [25] An adaptive smartphone anomaly detection model based on data mining
    Xue Li Hu
    Lian Cheng Zhang
    Zhen Xing Wang
    EURASIP Journal on Wireless Communications and Networking, 2018
  • [26] Applying fuzzy data mining to network unsupervised anomaly detection
    Xiang, G
    Min, W
    Zhao, RC
    INTERNATIONAL SYMPOSIUM ON COMMUNICATIONS AND INFORMATION TECHNOLOGIES 2005, VOLS 1 AND 2, PROCEEDINGS, 2005, : 1249 - 1253
  • [27] Strategies for data stream mining method applied in anomaly detection
    Ruxia Sun
    Sun Zhang
    Chunyong Yin
    Jin Wang
    Seungwook Min
    Cluster Computing, 2019, 22 : 399 - 408
  • [28] Data Mining Method for Anomaly Detection in the Supercomputer Task Flow
    Voevodin, Vadim
    Voevodin, Vladimir
    Shaikhislamov, Denis
    Nikitenko, Dmitry
    NUMERICAL COMPUTATIONS: THEORY AND ALGORITHMS (NUMTA-2016), 2016, 1776
  • [29] Wind Turbine Anomaly Detection Based on SCADA Data Mining
    Liu, Xiaoyuan
    Lu, Senxiang
    Ren, Yan
    Wu, Zhenning
    ELECTRONICS, 2020, 9 (05)
  • [30] Mining Anomalous Usage of Sensitive Data Through Anomaly Detection
    Jin, Xin
    Xiong, Yan
    Huang, Wenchao
    Meng, Zhaoyi
    2017 3RD INTERNATIONAL CONFERENCE ON BIG DATA COMPUTING AND COMMUNICATIONS (BIGCOM), 2017, : 59 - 67