Automatic Detection of Computer Network Traffic Anomalies based on Eccentricity Analysis

被引:0
|
作者
Martins, Rodrigo Siqueira [1 ]
Angelov, Plamen [2 ]
Jales Costa, Bruno Sielly [3 ,4 ]
机构
[1] Fed Inst Rio Grande do Norte, Campus Parnamirim, Parnamirim, Brazil
[2] Univ Lancaster, Sch Comp & Commun, Lancaster, England
[3] Fed Inst Rio Grande do Norte, Campus Natal Zona Norte, Natal, RN, Brazil
[4] Ford Motor Co, Res & Innovat Ctr, Palo Alto, CA USA
关键词
typicality; eccentricity; TEDA; anomaly detection; real time; computer networks; live migration;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
In this paper, we propose an approach to automatic detection of attacks on computer networks using data that combine the traffic generated with 'live' intra-cloud virtual-machine (VM) migration. The method used in this work is the recently introduced typicality and eccentricity data analytics (TEDA)framework. We compare the results of applying TEDA with the traditionally used methods such as statistical analysis, such as k-means clustering. One of the biggest challenges in computer network analysis using statistical or numerical methods is the fact that the protocols information is composed of integer/string values and, thus, not easy to handle by traditional pattern recognition methods that deal with real values. In this study we consider as features the tuple {IP source, IP destination, Port source and Port destination} extracted from the network flow data in addition to the traditionally used real values that represent the number of packets per time or quantity of bytes per time. Using entropy of the IP data helps to convert the integer raw data into real valued signatures. The proposed solution permit to build a real-time anomaly detection system and reduce the number of information that is necessary for evaluation. In general, the systems based on traffic are fast and are used in real time but they do not produce good results in attacks that produce a flow hidden within the background traffic or within a high traffic that is produced by other application. We validate our approach an a dataset which includes attacks on the network port scan (NPS) and network scan (NS) that permit hidden flow within the normal traffic and see this attacks together with live migration which produces a higher traffic flow.
引用
收藏
页数:8
相关论文
共 50 条
  • [21] Online Detection of Network Traffic Anomalies Using Behavioral Distance
    Sengar, Hemant
    Wang, Xinyuan
    Wang, Haining
    Wijesekera, Duminda
    Jajodia, Sushil
    IWQOS: 2009 IEEE 17TH INTERNATIONAL WORKSHOP ON QUALITY OF SERVICE, 2009, : 91 - +
  • [22] Real-time detection method for network traffic anomalies
    Zou, Bai-Xian
    Jisuanji Xuebao/Chinese Journal of Computers, 2003, 26 (08): : 940 - 947
  • [23] Using Traffic Self-Similarity for Network Anomalies Detection
    Popa, Sorin Mihai
    Manea, George Marian
    2015 20TH INTERNATIONAL CONFERENCE ON CONTROL SYSTEMS AND COMPUTER SCIENCE, 2015, : 639 - 644
  • [24] An information-theoretic method for the detection of anomalies in network traffic
    Callegari, Christian
    Giordano, Stefano
    Pagano, Michele
    COMPUTERS & SECURITY, 2017, 70 : 351 - 365
  • [25] Network traffic anomalies detection using Lipschitz singularity exponents
    Xu, Xiaodong
    Zhu, Shirui
    Sun, Yamin
    Journal of Information and Computational Science, 2008, 5 (04): : 1527 - 1533
  • [26] Uncovering network traffic anomalies based on their sparse distributions
    GuoZhen Cheng
    HongChang Chen
    DongNian Cheng
    Zhen Zhang
    JuLong Lan
    Science China Information Sciences, 2014, 57 : 1 - 11
  • [27] Uncovering network traffic anomalies based on their sparse distributions
    CHENG GuoZhen
    CHEN HongChang
    CHENG DongNian
    ZHANG Zhen
    LAN JuLong
    ScienceChina(InformationSciences), 2014, 57 (09) : 256 - 266
  • [28] Uncovering network traffic anomalies based on their sparse distributions
    Cheng GuoZhen
    Chen HongChang
    Cheng DongNian
    Zhang Zhen
    Lan JuLong
    SCIENCE CHINA-INFORMATION SCIENCES, 2014, 57 (09) : 1 - 11
  • [29] Peer to Peer Botnet Detection Based on Network Traffic Analysis
    Almutairi, Suzan
    Mahfoudh, Saoucene
    Alowibdi, Jalal S.
    2016 8TH IFIP INTERNATIONAL CONFERENCE ON NEW TECHNOLOGIES, MOBILITY AND SECURITY (NTMS), 2016,
  • [30] Abnormal Network Traffic Detection Based on Transfer Component Analysis
    Niu, Jie
    Zhang, Yong
    Liu, Dan
    Guo, Da
    Teng, Yinglei
    2019 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS WORKSHOPS (ICC WORKSHOPS), 2019,