Traffic Anomaly Detection Based on the IP Size Distribution

被引:0
|
作者
Soldo, Fabio [1 ]
Metwally, Ahmed [1 ]
机构
[1] Google Inc, Mountain View, CA 94043 USA
关键词
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
In this paper we present a data-driven framework for detecting machine-generated traffic based on the IP size, i.e., the number of users sharing the same source IP. Our main observation is that diverse machine-generated traffic attacks share a common characteristic: they induce an anomalous deviation from the expected IP size distribution. We develop a principled framework that automatically detects and classifies these deviations using statistical tests and ensemble learning. We evaluate our approach on a massive dataset collected at Google for 90 consecutive days. We argue that our approach combines desirable characteristics: it can accurately detect fraudulent machine-generated traffic; it is based on a fundamental characteristic of these attacks and is thus robust (e. g., to DHCP re-assignment) and hard to evade; it has low complexity and is easy to parallelize, making it suitable for large-scale detection; and finally, it does not entail profiling users, but leverages only aggregate statistics of network traffic.
引用
收藏
页码:2005 / 2013
页数:9
相关论文
共 50 条
  • [1] Distribution-based anomaly detection in network traffic
    Coluccia, Angelo
    D'Alconzo, Alessandro
    Ricciato, Fabio
    Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2013, 7754 : 202 - 216
  • [2] TRAFFIC ANOMALY BASED DETECTION
    Nurohman, Hanif
    Purwanto, Yudha
    Hafidudin
    2015 INTERNATIONAL CONFERENCE ON CONTROL, ELECTRONICS, RENEWABLE ENERGY AND COMMUNICATIONS (ICCEREC), 2015, : 1 - 6
  • [3] Load characterization and anomaly detection for voice over IP traffic
    Mandjes, M
    Saniee, I
    Stolyar, AL
    IEEE TRANSACTIONS ON NEURAL NETWORKS, 2005, 16 (05): : 1019 - 1026
  • [4] Forecasting the Distribution of Network Traffic for Anomaly Detection
    Callegari, Christian
    Giordano, Stefano
    Pagano, Michele
    Pepe, Teresa
    TRUSTCOM 2011: 2011 INTERNATIONAL JOINT CONFERENCE OF IEEE TRUSTCOM-11/IEEE ICESS-11/FCST-11, 2011, : 173 - 180
  • [5] Network Anomaly Detection Through IP Traffic Analysis With Variable Granularity
    Kamamura, Shohei
    Takei, Yuki
    Nishiguchi, Masato
    Hayashi, Yuhei
    Fujiwara, Takayuki
    IEEE ACCESS, 2023, 11 : 129818 - 129828
  • [6] Anomaly Detection using prior knowledge: application to TCP/IP traffic
    Carrascal, Alberto
    Couchet, Jorge
    Ferreira, Enrique
    Manrique, Daniel
    ARTIFICIAL INTELLIGENCE IN THEORY AND PRACTICE, 2006, 217 : 139 - 148
  • [7] Anomaly Detection of Hostile Traffic Based on Network Traffic Distributions
    Kang, Koohong
    INFORMATION NETWORKING: TOWARDS UBIQUITOUS NETWORKING AND SERVICES, 2008, 5200 : 781 - 790
  • [8] Anomaly detection based on traffic information structure
    Zhu Y.-W.
    Yang J.-H.
    Zhang J.-X.
    Ruan Jian Xue Bao/Journal of Software, 2010, 21 (10): : 2573 - 2583
  • [9] Network Anomaly Detection based on Traffic Prediction
    Wang, Fengyu
    Gong, Bin
    Hu, Yi
    Zhang, Ningbo
    2009 INTERNATIONAL CONFERENCE ON SCALABLE COMPUTING AND COMMUNICATIONS & EIGHTH INTERNATIONAL CONFERENCE ON EMBEDDED COMPUTING, 2009, : 449 - 454
  • [10] Anomaly Traffic Detection Based on PCA and SFAM
    Somwang, Preecha
    Lilakiatsakun, Woraphon
    INTERNATIONAL ARAB JOURNAL OF INFORMATION TECHNOLOGY, 2015, 12 (03) : 253 - 260