Automatic Detection of Computer Network Traffic Anomalies based on Eccentricity Analysis

被引:0
|
作者
Martins, Rodrigo Siqueira [1 ]
Angelov, Plamen [2 ]
Jales Costa, Bruno Sielly [3 ,4 ]
机构
[1] Fed Inst Rio Grande do Norte, Campus Parnamirim, Parnamirim, Brazil
[2] Univ Lancaster, Sch Comp & Commun, Lancaster, England
[3] Fed Inst Rio Grande do Norte, Campus Natal Zona Norte, Natal, RN, Brazil
[4] Ford Motor Co, Res & Innovat Ctr, Palo Alto, CA USA
关键词
typicality; eccentricity; TEDA; anomaly detection; real time; computer networks; live migration;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
In this paper, we propose an approach to automatic detection of attacks on computer networks using data that combine the traffic generated with 'live' intra-cloud virtual-machine (VM) migration. The method used in this work is the recently introduced typicality and eccentricity data analytics (TEDA)framework. We compare the results of applying TEDA with the traditionally used methods such as statistical analysis, such as k-means clustering. One of the biggest challenges in computer network analysis using statistical or numerical methods is the fact that the protocols information is composed of integer/string values and, thus, not easy to handle by traditional pattern recognition methods that deal with real values. In this study we consider as features the tuple {IP source, IP destination, Port source and Port destination} extracted from the network flow data in addition to the traditionally used real values that represent the number of packets per time or quantity of bytes per time. Using entropy of the IP data helps to convert the integer raw data into real valued signatures. The proposed solution permit to build a real-time anomaly detection system and reduce the number of information that is necessary for evaluation. In general, the systems based on traffic are fast and are used in real time but they do not produce good results in attacks that produce a flow hidden within the background traffic or within a high traffic that is produced by other application. We validate our approach an a dataset which includes attacks on the network port scan (NPS) and network scan (NS) that permit hidden flow within the normal traffic and see this attacks together with live migration which produces a higher traffic flow.
引用
收藏
页数:8
相关论文
共 50 条
  • [41] Using Internet traffic self-similarity for detection of network anomalies
    Dobrescu, R.
    Dobrescu, M.
    Hossu, D.
    Taralunga, S.
    OPTIM 2008: PROCEEDINGS OF THE 11TH INTERNATIONAL CONFERENCE ON OPTIMIZATION OF ELECTRICAL AND ELECTRONIC EQUIPMENT, VOL III, 2008, : 81 - 86
  • [42] A Case Study for Automatic Detection of Steganographic Images in Network Traffic
    Erdem, Omer
    Turan, Metin
    2017 10TH INTERNATIONAL CONFERENCE ON ELECTRICAL AND ELECTRONICS ENGINEERING (ELECO), 2017, : 885 - 889
  • [43] Analysis and Detection of Anomalous Network Traffic
    Jeong, Hae-Duck J.
    Kim, Hyeonggeun
    Ahn, WonHwi
    Oh, Jung-hee
    Lee, Dawoon
    Ye, Sang-Kug
    Lee, Jongsuk R.
    2016 10TH INTERNATIONAL CONFERENCE ON INNOVATIVE MOBILE AND INTERNET SERVICES IN UBIQUITOUS COMPUTING (IMIS), 2016, : 403 - 408
  • [44] Automatic Information Extraction of Traffic Panels based on Computer Vision
    Gonzalez, A.
    Bergasa, L. M.
    Gavilan, M.
    Sotelo, M. A.
    Herranz, F.
    Fernandez, C.
    2009 12TH INTERNATIONAL IEEE CONFERENCE ON INTELLIGENT TRANSPORTATION SYSTEMS (ITSC 2009), 2009, : 184 - 189
  • [45] SPATIAL ANALYSIS BASED METHOD FOR DETECTION OF DATA TRAFFIC PROBLEMS IN COMPUTER NETWORKS
    Kolaczek, Grzegorz
    UNCERTAINTY MODELING IN KNOWLEDGE ENGINEERING AND DECISION MAKING, 2012, 7 : 919 - 924
  • [46] Sparse Laplacian Component Analysis for Internet Traffic Anomalies Detection
    Khatua, Manas
    Safavi, Seyed Hamid
    Cheung, Ngai-Man
    IEEE TRANSACTIONS ON SIGNAL AND INFORMATION PROCESSING OVER NETWORKS, 2018, 4 (04): : 697 - 711
  • [47] DDoS Detection Method Based on Chaos Analysis of Network Traffic Entropy
    Ma, Xinlei
    Chen, Yonghong
    IEEE COMMUNICATIONS LETTERS, 2014, 18 (01) : 114 - 117
  • [48] An Abnormal Network Traffic Detection Algorithm Based on Big Data Analysis
    Yao, H. P.
    Liu, Y. Q.
    Fang, C.
    INTERNATIONAL JOURNAL OF COMPUTERS COMMUNICATIONS & CONTROL, 2016, 11 (04) : 567 - 579
  • [49] Intrusion Detection Using Flow-Based Analysis of Network Traffic
    David, Jisa
    Thomas, Ciza
    ADVANCES IN NETWORKS AND COMMUNICATIONS, PT II, 2011, 132 : 391 - 399
  • [50] Anomaly detection of excessive network traffic based on ratio and volume analysis
    Kim, Hyun Joo
    Na, Jung C.
    Jang, Jong S.
    INTELLIGENCE AND SECURITY INFORMATICS, PROCEEDINGS, 2006, 3975 : 726 - 727