Network traffic anomalies detection and identification with flow monitoring

被引:6
|
作者
Nguyen, Huy Anh [1 ]
Nguyen, Tam Van [1 ]
Kim, Dong Il [1 ]
Choi, Deokjai [1 ]
机构
[1] Chonnam Natl Univ, Dept Comp Engn, Kwangju, South Korea
关键词
D O I
10.1109/CCE.2008.4578964
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Network management and security is currently one of the most vibrant research areas, among which, research on detecting and identifying anomalies has attracted a lot of interest. Researchers are still struggling to rind an effective and lightweight method for anomaly detection purpose. In this paper, we propose a simple, robust method that detects network anomalous traffic data based on flow monitoring. Our method works based on monitoring the four predefined metrics that capture the flow statistics of the network. In order to prove the power of the new method, we did build an application that detects network anomalies using our method. And the result of the experiments proves that by using the four simple metrics from the flow data, we do not only effectively detect but can also identify the network traffic anomalies.
引用
收藏
页码:235 / +
页数:2
相关论文
共 50 条
  • [31] Application-Level Traffic Identification of Network Security Monitoring
    Lin, Zhenbiao
    Chen, Xingyuan
    Wang, Yongwei
    PROCEEDINGS OF THE FIRST INTERNATIONAL WORKSHOP ON EDUCATION TECHNOLOGY AND COMPUTER SCIENCE, VOL II, 2009, : 738 - 742
  • [32] Network Attack Traffic Detection for Calculating Correlation of the Flow
    Park, Jee-Tae
    Goo, Young-Hoon
    Shim, Kyu-Seok
    Back, Ui-Jun
    Kim, Myung-Sup
    2018 INTERNATIONAL CONFERENCE ON INFORMATION AND COMMUNICATION TECHNOLOGY CONVERGENCE (ICTC), 2018, : 928 - 931
  • [33] Detection accuracy of network anomalies using sampled flow statistics
    Kawahara, Ryoichi
    Ishibashi, Keisuke
    Mori, Tatsuya
    Kamiyama, Noriaki
    Harada, Shigeaki
    Asano, Shoichiro
    GLOBECOM 2007: 2007 IEEE GLOBAL TELECOMMUNICATIONS CONFERENCE, VOLS 1-11, 2007, : 1959 - +
  • [34] Detection accuracy of network anomalies using sampled flow statistics
    Kawahara, Ryoichi
    Ishibashi, Keisuke
    Mori, Tatsuya
    Kamiyama, Noriaki
    Harada, Shigeaki
    Hasegawa, Haruhisa
    Asano, Shoichiro
    INTERNATIONAL JOURNAL OF NETWORK MANAGEMENT, 2011, 21 (06) : 513 - 535
  • [35] Research and realization of campus network traffic flow monitoring system
    Dept. of Information Engineering, Southwest University of Science and Technology, Mianyang 621010, China
    不详
    不详
    不详
    Liaoning Gongcheng Jishu Daxue Xuebao (Ziran Kexue Ban), 2007, 3 (407-409):
  • [36] Reduction of IP Flow Information in Network Traffic Monitoring Systems
    Tremko, Samuel
    Pekar, Adrian
    Juhar, Jan
    Janitor, Jozef
    12TH IEEE INTERNATIONAL CONFERENCE ON EMERGING ELEARNING TECHNOLOGIES AND APPLICATIONS (ICETA 2014), 2014, : 385 - 390
  • [37] A Taxonomy of Anomalies in Backbone Network Traffic
    Mazel, Johan
    Fontugne, Romain
    Fukuda, Kensuke
    2014 INTERNATIONAL WIRELESS COMMUNICATIONS AND MOBILE COMPUTING CONFERENCE (IWCMC), 2014, : 30 - 36
  • [38] Risk Leveling of Network Traffic Anomalies
    Isaksson, Charlie
    Meng, Yu
    Dunham, Margaret H.
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2006, 6 (06): : 258 - 265
  • [39] Automated Classification of Network Traffic Anomalies
    Fernandes, Guilherme
    Owezarski, Philippe
    SECURITY AND PRIVACY IN COMMUNICATION NETWORKS, 2009, 19 : 91 - 100
  • [40] A signal analysis of network traffic anomalies
    Barford, P
    Kline, J
    Plonka, D
    Ron, A
    IMW 2002: PROCEEDINGS OF THE SECOND INTERNET MEASUREMENT WORKSHOP, 2002, : 71 - 82