Autonomous profile-based anomaly detection system using principal component analysis and flow analysis

被引:33
|
作者
Fernandes, Gilberto, Jr. [1 ]
Rodrigues, Joel J. P. C. [1 ,2 ]
Proenca, Mario Lemes, Jr. [3 ]
机构
[1] Univ Beira Interior, Inst Telecomunicacoes, Covilha, Portugal
[2] Univ Fortaleza UNIFOR, Fortaleza, Ceara, Brazil
[3] State Univ Londrina UEL, Dept Comp Sci, Londrina, Brazil
关键词
Network management; Traffic characterization; Anomaly detection; Principal component analysis; Flows; FEATURE-SELECTION; PCA; ROBUST;
D O I
10.1016/j.asoc.2015.05.019
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Different techniques and methods have been widely used in the subject of automatic anomaly detection in computer networks. Attacks, problems and internal failures when not detected early may badly harm an entire Network system. Thus, an autonomous anomaly detection system based on the statistical method principal component analysis (PCA) is proposed. This approach creates a network profile called Digital Signature of Network Segment using Flow Analysis (DSNSF) that denotes the predicted normal behavior of a network traffic activity through historical data analysis. That digital signature is used as a threshold for volume anomaly detection to detect disparities in the normal traffic trend. The proposed system uses seven traffic flow attributes: bits, packets and number of flows to detect problems, and source and destination IP addresses and Ports, to provides the network administrator necessary information to solve them. Via evaluation techniques performed in this paper using real network traffic data, results showed good traffic prediction by the DSNSF and encouraging false alarm generation and detection accuracy on the detection schema using thresholds. (C) 2015 Elsevier B.V. All rights reserved.
引用
收藏
页码:513 / 525
页数:13
相关论文
共 50 条
  • [41] Network anomaly detection using IP flows with Principal Component Analysis and Ant Colony Optimization
    Fernandes, Gilberto, Jr.
    Carvalho, Luiz F.
    Rodrigues, Joel J. P. C.
    Proenca, Mario Lemes, Jr.
    JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2016, 64 : 1 - 11
  • [42] Lightweight Anomaly Detection Scheme Using Incremental Principal Component Analysis and Support Vector Machine
    Zamry, Nurfazrina M.
    Zainal, Anazida
    Rassam, Murad A.
    Alkhammash, Eman H.
    Ghaleb, Fuad A.
    Saeed, Faisal
    SENSORS, 2021, 21 (23)
  • [43] Anomaly detection for satellite power subsystem with associated rules based on Kernel Principal Component Analysis
    Pan, Dawei
    Liu, Datong
    Zhou, Jun
    Zhang, Guoyong
    MICROELECTRONICS RELIABILITY, 2015, 55 (9-10) : 2082 - 2086
  • [44] Damage Detection using Principal Component Analysis based on Wavelet Ridges
    Gharibnezhad, F.
    Mujica, L. E.
    Rodellar, J.
    Fritzen, C. P.
    DAMAGE ASSESSMENT OF STRUCTURES X, PTS 1 AND 2, 2013, 569-570 : 916 - +
  • [45] Data anomaly detection and Data fusion based on Incremental Principal Component Analysis in Fog Computing
    Yu, Xue-Yong
    Guo, Xin-Hui
    KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2020, 14 (10): : 3989 - 4006
  • [46] Principal component-based anomaly detection scheme
    Shyu, ML
    Chen, SC
    Sarinnapakorn, K
    Chang, LW
    FOUNDATIONS AND NOVEL APPROACHES IN DATA MINING, 2006, 9 : 311 - +
  • [47] Eagle: User Profile-based Anomaly Detection for Securing Hadoop Clusters
    Gupta, Chaitali
    Sinha, Ranjan
    Zhang, Yong
    PROCEEDINGS 2015 IEEE INTERNATIONAL CONFERENCE ON BIG DATA, 2015, : 1336 - 1343
  • [48] Using Principal Component Analysis for Selecting Network Behavioral Anomaly Metrics
    Gregorio-de Souza, Ian
    Berk, Vincent
    Barsamian, Alex
    SENSORS, AND COMMAND, CONTROL, COMMUNICATIONS, AND INTELLIGENCE (C3I) TECHNOLOGIES FOR HOMELAND SECURITY AND HOMELAND DEFENSE IX, 2010, 7666
  • [49] Power Flow Studies Using Principal Component Analysis
    Bo, Rui
    Li, Fangxing
    2008 40TH NORTH AMERICAN POWER SYMPOSIUM (NAPS 2008), 2008, : 583 - 588
  • [50] Anomaly Detection in Financial Time Series by Principal Component Analysis and Neural Networks
    Crepey, Stephane
    Lehdili, Noureddine
    Madhar, Nisrine
    Thomas, Maud
    ALGORITHMS, 2022, 15 (10)