Automatic Detection of Computer Network Traffic Anomalies based on Eccentricity Analysis

被引:0
|
作者
Martins, Rodrigo Siqueira [1 ]
Angelov, Plamen [2 ]
Jales Costa, Bruno Sielly [3 ,4 ]
机构
[1] Fed Inst Rio Grande do Norte, Campus Parnamirim, Parnamirim, Brazil
[2] Univ Lancaster, Sch Comp & Commun, Lancaster, England
[3] Fed Inst Rio Grande do Norte, Campus Natal Zona Norte, Natal, RN, Brazil
[4] Ford Motor Co, Res & Innovat Ctr, Palo Alto, CA USA
关键词
typicality; eccentricity; TEDA; anomaly detection; real time; computer networks; live migration;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
In this paper, we propose an approach to automatic detection of attacks on computer networks using data that combine the traffic generated with 'live' intra-cloud virtual-machine (VM) migration. The method used in this work is the recently introduced typicality and eccentricity data analytics (TEDA)framework. We compare the results of applying TEDA with the traditionally used methods such as statistical analysis, such as k-means clustering. One of the biggest challenges in computer network analysis using statistical or numerical methods is the fact that the protocols information is composed of integer/string values and, thus, not easy to handle by traditional pattern recognition methods that deal with real values. In this study we consider as features the tuple {IP source, IP destination, Port source and Port destination} extracted from the network flow data in addition to the traditionally used real values that represent the number of packets per time or quantity of bytes per time. Using entropy of the IP data helps to convert the integer raw data into real valued signatures. The proposed solution permit to build a real-time anomaly detection system and reduce the number of information that is necessary for evaluation. In general, the systems based on traffic are fast and are used in real time but they do not produce good results in attacks that produce a flow hidden within the background traffic or within a high traffic that is produced by other application. We validate our approach an a dataset which includes attacks on the network port scan (NPS) and network scan (NS) that permit hidden flow within the normal traffic and see this attacks together with live migration which produces a higher traffic flow.
引用
收藏
页数:8
相关论文
共 50 条
  • [1] Network traffic anomalies automatic detection in DDoS attacks
    Orekhov, Andrey V.
    Orekhov, Aleksey A.
    VESTNIK SANKT-PETERBURGSKOGO UNIVERSITETA SERIYA 10 PRIKLADNAYA MATEMATIKA INFORMATIKA PROTSESSY UPRAVLENIYA, 2023, 19 (02): : 251 - 263
  • [2] WK-FNN DESIGN FOR DETECTION OF ANOMALIES IN THE COMPUTER NETWORK TRAFFIC
    Protic, Danijela
    Stankovic, Miomir
    Antic, Vladimir
    FACTA UNIVERSITATIS-SERIES ELECTRONICS AND ENERGETICS, 2022, 35 (02) : 269 - 282
  • [3] Wavelet methods for the detection of anomalies and their application to network traffic analysis
    Kwon, D. W.
    Ko, K.
    Vannucci, M.
    Reddy, A. L. N.
    Kim, S.
    QUALITY AND RELIABILITY ENGINEERING INTERNATIONAL, 2006, 22 (08) : 953 - 969
  • [4] Detection and analysis of cellular network traffic anomalies and SMS spammers
    Sandhya, B. S.
    Deshpande, Rohini
    JOURNAL OF ELECTRICAL SYSTEMS, 2024, 20 (03) : 685 - 700
  • [5] Automatic construction of a decision tree for the analysis of traffic load in computer network
    Vlachogiannis, John G.
    COMPUTER SYSTEMS SCIENCE AND ENGINEERING, 2007, 22 (1-2): : 91 - 95
  • [6] XOR-Based Detector of Different Decisions on Anomalies in the Computer Network Traffic
    Protic, Danijela
    Stankovic, Miomir
    ROMANIAN JOURNAL OF INFORMATION SCIENCE AND TECHNOLOGY, 2023, 26 (3-4): : 323 - 338
  • [7] Wavelet-based real time detection of network traffic anomalies
    Department of Computer Science and Engineering, University of South Carolina, 301 Main St, Columbia, SC29208, United States
    不详
    Int. J. Netw. Secur., 2008, 3 (309-320):
  • [8] Wavelet-based real time detection of network traffic anomalies
    Huang, Chin-Tser
    Thareja, Sachin
    Shin, Yong-June
    2006 SECURECOMM AND WORKSHOPS, 2006, : 473 - +
  • [9] A signal analysis of network traffic anomalies
    Barford, P
    Kline, J
    Plonka, D
    Ron, A
    IMW 2002: PROCEEDINGS OF THE SECOND INTERNET MEASUREMENT WORKSHOP, 2002, : 71 - 82
  • [10] Towards Automatic Detection and Diagnosis of Internet Service Anomalies via DNS Traffic Analysis
    Fiadino, Pierdomenico
    D'Alconzo, Alessandro
    Schiavone, Mirko
    Casas, Pedro
    2015 INTERNATIONAL WIRELESS COMMUNICATIONS & MOBILE COMPUTING CONFERENCE (IWCMC), 2015, : 373 - 378