Automatic Detection of Computer Network Traffic Anomalies based on Eccentricity Analysis

被引:0
|
作者
Martins, Rodrigo Siqueira [1 ]
Angelov, Plamen [2 ]
Jales Costa, Bruno Sielly [3 ,4 ]
机构
[1] Fed Inst Rio Grande do Norte, Campus Parnamirim, Parnamirim, Brazil
[2] Univ Lancaster, Sch Comp & Commun, Lancaster, England
[3] Fed Inst Rio Grande do Norte, Campus Natal Zona Norte, Natal, RN, Brazil
[4] Ford Motor Co, Res & Innovat Ctr, Palo Alto, CA USA
关键词
typicality; eccentricity; TEDA; anomaly detection; real time; computer networks; live migration;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
In this paper, we propose an approach to automatic detection of attacks on computer networks using data that combine the traffic generated with 'live' intra-cloud virtual-machine (VM) migration. The method used in this work is the recently introduced typicality and eccentricity data analytics (TEDA)framework. We compare the results of applying TEDA with the traditionally used methods such as statistical analysis, such as k-means clustering. One of the biggest challenges in computer network analysis using statistical or numerical methods is the fact that the protocols information is composed of integer/string values and, thus, not easy to handle by traditional pattern recognition methods that deal with real values. In this study we consider as features the tuple {IP source, IP destination, Port source and Port destination} extracted from the network flow data in addition to the traditionally used real values that represent the number of packets per time or quantity of bytes per time. Using entropy of the IP data helps to convert the integer raw data into real valued signatures. The proposed solution permit to build a real-time anomaly detection system and reduce the number of information that is necessary for evaluation. In general, the systems based on traffic are fast and are used in real time but they do not produce good results in attacks that produce a flow hidden within the background traffic or within a high traffic that is produced by other application. We validate our approach an a dataset which includes attacks on the network port scan (NPS) and network scan (NS) that permit hidden flow within the normal traffic and see this attacks together with live migration which produces a higher traffic flow.
引用
收藏
页数:8
相关论文
共 50 条
  • [31] Detection of network traffic anomaly based on instantaneous parameters analysis
    Yao, Xingmiao
    Zhang, Peng
    Gao, Jie
    Hu, Guangmin
    2006 10TH INTERNATIONAL CONFERENCE ON COMMUNICATION TECHNOLOGY, VOLS 1 AND 2, PROCEEDINGS, 2006, : 336 - +
  • [32] Smart Approach for Botnet Detection Based on Network Traffic Analysis
    Obeidat, Alaa
    Yaqbeh, Rola
    JOURNAL OF ELECTRICAL AND COMPUTER ENGINEERING, 2022, 2022
  • [33] A Framework for Detection of Traffic Anomalies Based on IP Aggregation
    Zhanikeevi, Marat
    Tanakat, Yoshiaki
    IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2009, E92D (01): : 16 - 23
  • [34] Automatic bottleneck detection based on traffic hysteresis phenomena:: An application to Paris highway network
    Sánchez, O
    Mekkaoui, O
    INNOVATIVE INTERNET COMMUNITY SYSTEMS, 2006, 3473 : 236 - 251
  • [35] The Analysis and Design of the Computer Network Traffic Monitor
    Zhou Xiong
    MECHATRONICS ENGINEERING, COMPUTING AND INFORMATION TECHNOLOGY, 2014, 556-562 : 6791 - 6794
  • [36] Statistical methods for computer network traffic analysis
    Lee, I. W. C.
    Fapojuwo, A. O.
    IEE PROCEEDINGS-COMMUNICATIONS, 2006, 153 (06): : 939 - 948
  • [37] Automatic traffic incident detection based on nFOIL
    Lu, Jian
    Chen, Shuyan
    Wang, Wei
    Ran, Bin
    EXPERT SYSTEMS WITH APPLICATIONS, 2012, 39 (07) : 6547 - 6556
  • [38] Artificial intelligence-based network traffic analysis and automatic optimization technology
    Ren, Jiyuan
    Zhang, Yunhou
    Wang, Zhe
    Song, Yang
    MATHEMATICAL BIOSCIENCES AND ENGINEERING, 2022, 19 (02) : 1775 - 1785
  • [39] Identifying Anomalies in Network Traffic using Hybrid Intrusion Detection System
    Garg, Akash
    Maheshwari, Prachi
    2016 3RD INTERNATIONAL CONFERENCE ON ADVANCED COMPUTING AND COMMUNICATION SYSTEMS (ICACCS), 2016,
  • [40] Bringing Data Analytics to the Network Nodes for Efficient Traffic Anomalies Detection
    Vela, Alba P.
    Ruiz, Marc
    Velasco, Luis
    2017 19TH INTERNATIONAL CONFERENCE ON TRANSPARENT OPTICAL NETWORKS (ICTON), 2017,