Applying Catastrophe Theory for Network Anomaly Detection in Cloud Computing Traffic

被引:7
|
作者
Khatibzadeh, Leila [1 ]
Bornaee, Zarrintaj [1 ]
Bafghi, Abbas Ghaemi [2 ]
机构
[1] IROST, Elect Engn & Informat Technol Dept, Tehran 3353136846, Iran
[2] Ferdowsi Univ Mashhad, Comp Dept, Fac Engn, Mashhad, Razavi Khorasan, Iran
关键词
DETECTION SYSTEM; PREDICTION;
D O I
10.1155/2019/5306395
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In spite of the tangible advantages of cloud computing, it is still vulnerable to potential attacks and threats. In light of this, security has turned into one of the main concerns in the adoption of cloud computing. Therefore, an anomaly detection method plays an important role in providing a high protection level for network security. One of the challenges in anomaly detection, which has not been seriously considered in the literature, is applying the dynamic nature of cloud traffic in its prediction while maintaining an acceptable level of accuracy besides reducing the computational cost. On the other hand, to overcome the issue of additional training time, introducing a high-speed algorithm is essential. In this paper, a network traffic anomaly detection model grounded in Catastrophe Theory is proposed. This theory is effective in depicting sudden change processes of the network due to the dynamic nature of the cloud. Exponential Moving Average (EMA) is applied for the state variable in sliding window to better show the dynamicity of cloud network traffic. Entropy is used as one of the control variables in catastrophe theory to analyze the distribution of traffic features. Our work is compared with Wei Xiong et al.'s Catastrophe Theory and achieved a maximum improvement in the percentage of Detection Rate in week 4 Wednesday (7.83%) and a 0.31% reduction in False Positive Rate in week 5 Monday. Additional accuracy parameters are checked and the impact of sliding window size in sensitivity and specificity is considered.
引用
收藏
页数:11
相关论文
共 50 条
  • [31] A BasisEvolution framework for network traffic anomaly detection
    Xia, Hui
    Fang, Bin
    Roughan, Matthew
    Cho, Kenjiro
    Tune, Paul
    COMPUTER NETWORKS, 2018, 135 : 15 - 31
  • [32] USING R FOR ANOMALY DETECTION IN NETWORK TRAFFIC
    Hock, Denis
    Kappes, Martin
    PROCEEDINGS OF THE FIFTH INTERNATIONAL CONFERENCE ON INTERNET TECHNOLOGIES AND APPLICATIONS (ITA 13), 2013, : 98 - 105
  • [33] Approach to anomaly traffic detection in a local network
    Wang, Xiu-Ying
    Xiao, Li-Zhong
    Shao, Zhi-Qing
    Journal of Donghua University (English Edition), 2009, 26 (06) : 656 - 661
  • [34] Analysis of network traffic features for anomaly detection
    Félix Iglesias
    Tanja Zseby
    Machine Learning, 2015, 101 : 59 - 84
  • [35] Promising Techniques for Anomaly Detection on Network Traffic
    Tian, Hui
    Liu, Jingtian
    Ding, Meimei
    COMPUTER SCIENCE AND INFORMATION SYSTEMS, 2017, 14 (03) : 597 - 609
  • [36] Forecasting the Distribution of Network Traffic for Anomaly Detection
    Callegari, Christian
    Giordano, Stefano
    Pagano, Michele
    Pepe, Teresa
    TRUSTCOM 2011: 2011 INTERNATIONAL JOINT CONFERENCE OF IEEE TRUSTCOM-11/IEEE ICESS-11/FCST-11, 2011, : 173 - 180
  • [37] Research on network traffic anomaly detection algorithm
    Lv, Jun
    Li, Tong
    Li, Xing
    2007 IEEE SYMPOSIUM ON COMPUTERS AND COMMUNICATIONS, VOLS 1-3, 2007, : 1097 - 1102
  • [38] Approach to Anomaly Traffic Detection in a Local Network
    王秀英
    肖立中
    邵志清
    Journal of Donghua University(English Edition), 2009, 26 (06) : 656 - 661
  • [39] Network Traffic Monitoring, Analysis and Anomaly Detection
    Wang, Wei
    Zhang, Xiangliang
    Shi, Wenchang
    Lian, Shiguo
    Feng, Dengguo
    IEEE NETWORK, 2011, 25 (03): : 6 - 7
  • [40] Anomaly Detection of Hostile Traffic Based on Network Traffic Distributions
    Kang, Koohong
    INFORMATION NETWORKING: TOWARDS UBIQUITOUS NETWORKING AND SERVICES, 2008, 5200 : 781 - 790