Traffic Anomaly Detection Based on the IP Size Distribution

被引:0
|
作者
Soldo, Fabio [1 ]
Metwally, Ahmed [1 ]
机构
[1] Google Inc, Mountain View, CA 94043 USA
关键词
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
In this paper we present a data-driven framework for detecting machine-generated traffic based on the IP size, i.e., the number of users sharing the same source IP. Our main observation is that diverse machine-generated traffic attacks share a common characteristic: they induce an anomalous deviation from the expected IP size distribution. We develop a principled framework that automatically detects and classifies these deviations using statistical tests and ensemble learning. We evaluate our approach on a massive dataset collected at Google for 90 consecutive days. We argue that our approach combines desirable characteristics: it can accurately detect fraudulent machine-generated traffic; it is based on a fundamental characteristic of these attacks and is thus robust (e. g., to DHCP re-assignment) and hard to evade; it has low complexity and is easy to parallelize, making it suitable for large-scale detection; and finally, it does not entail profiling users, but leverages only aggregate statistics of network traffic.
引用
收藏
页码:2005 / 2013
页数:9
相关论文
共 50 条
  • [21] Network Traffic Anomaly Detection Based on Wavelet Analysis
    Du, Zhen
    Ma, Lipeng
    Li, Huakang
    Li, Qun
    Sun, Guozi
    Liu, Zichang
    2018 IEEE/ACIS 16TH INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING RESEARCH, MANAGEMENT AND APPLICATION (SERA), 2018, : 94 - 101
  • [22] Anomaly detection based on the dynamic feature of network traffic
    Zhang, Yaxing
    Jin, Shuyuan
    Wang, Yuanzhuo
    Wang, Yanxia
    ADVANCES IN ENERGY, ENVIRONMENT AND MATERIALS SCIENCE, 2016, : 781 - 789
  • [23] Traffic anomaly detection based on image descriptor in videos
    Li, Yanshan
    Liu, Weiming
    Huang, Qinghua
    MULTIMEDIA TOOLS AND APPLICATIONS, 2016, 75 (05) : 2487 - 2505
  • [24] Network Traffic Anomaly Detection based on Catastrophe Theory
    Xiong, Wei
    Xiong, Naixue
    Yang, Laurence T.
    Vasilakos, Athanasios V.
    Wang, Qian
    Hu, Hanping
    2010 IEEE GLOBECOM WORKSHOPS, 2010, : 2070 - 2074
  • [25] PCA-Based Network Traffic Anomaly Detection
    Ding, Meimei
    Tian, Hui
    TSINGHUA SCIENCE AND TECHNOLOGY, 2016, 21 (05) : 500 - 509
  • [26] Anomaly Detection on Traffic Videos Based on Trajectory Simplification
    Isaloo, Mehdi
    Azimifar, Zohreh
    2013 8TH IRANIAN CONFERENCE ON MACHINE VISION & IMAGE PROCESSING (MVIP 2013), 2013, : 200 - 203
  • [27] Network Traffic Analysis based on Collective Anomaly Detection
    Ahmed, Mohiuddin
    Mahmood, Abdun Naser
    PROCEEDINGS OF THE 2014 9TH IEEE CONFERENCE ON INDUSTRIAL ELECTRONICS AND APPLICATIONS (ICIEA), 2014, : 1141 - 1146
  • [28] Traffic anomaly detection based on image descriptor in videos
    Yanshan Li
    Weiming Liu
    Qinghua Huang
    Multimedia Tools and Applications, 2016, 75 : 2487 - 2505
  • [29] Road Traffic Anomaly Detection Based on Fuzzy Theory
    Li, Yanshan
    Guo, Tianyu
    Xia, Rongjie
    Xie, Weixin
    IEEE ACCESS, 2018, 6 : 40281 - 40288
  • [30] Network Traffic Anomaly Detection based on Ratio and Volume
    Kim, Hyun Joo
    Na, Jung C.
    Jang, Jong S.
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2006, 6 (5B): : 190 - 193