An overview of flow-based anomaly detection

被引:9
作者
Sharma, Rohini [1 ]
Guleria, Ajay [2 ]
Singla, R. K. [1 ]
机构
[1] Panjab Univ, Dept Comp Sci & Applicat, Chandigarh, India
[2] Panjab Univ, Comp Ctr, Chandigarh, India
关键词
network flows; anomaly detection; security; privacy; flow-based dataset; statistical techniques; machine learning; clustering; frequent pattern mining; software agents;
D O I
10.1504/IJCNDS.2018.10014505
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Intrusions in computer networks are handled using misuse or anomaly-based solutions. Deep packet inspection is generally incorporated in solutions for better detection and mitigation but with the growth of networks at exponential speed, it has become an expensive solution and makes real-time detection difficult. In this paper, network flows-based anomaly detection techniques are reviewed. The review starts with motivation behind using network flows and justifies why flow-based anomaly detection is the need of the hour. Flow-based datasets are also investigated and reviewed. The main focus is on techniques and methodologies used by researchers for anomaly detection in computer networks. The techniques reviewed are categorised into five classes: statistical, machine learning, clustering, frequent pattern mining and agent-based. At the end the core research problems and open challenges are discussed.
引用
收藏
页码:220 / 240
页数:21
相关论文
共 62 条
[61]   Discriminating DDoS Attacks from Flash Crowds Using Flow Correlation Coefficient [J].
Yu, Shui ;
Zhou, Wanlei ;
Jia, Weijia ;
Guo, Song ;
Xiang, Yong ;
Tang, Feilong .
IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2012, 23 (06) :1073-1080
[62]  
Zang X., 2011, CSE11001 PENNS STAT, P16802