Anomaly Detection of Network Traffic Based on Prediction and Self-Adaptive Threshold

被引:6
作者
Wang, Haiyan [1 ]
机构
[1] Binzhou Univ, Dept Informat Engn, Binzhou 256600, Shandong, Peoples R China
来源
INTERNATIONAL JOURNAL OF FUTURE GENERATION COMMUNICATION AND NETWORKING | 2015年 / 8卷 / 06期
关键词
Network traffic prediction; Anomaly detection; Wavelet decomposition; Central Limit Theorem;
D O I
10.14257/ijfgcn.2015.8.6.20
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
Security problems with network are significant, such as network failures and malicious attacks. Monitoring network traffic and detect anomalies of network traffic is one of the effective manner to ensure network security. In this paper, we propose a hybrid method for network traffic prediction and anomaly detection. Specifically, the original network traffic data is decomposed into high-frequency components and low-frequency components. Then, non-linear model Relevance Vector Machine (RVM) model and ARMA (Auto Regressive Moving Average) model are employed respectively for prediction. After combining the prediction, a self-adaptive threshold method based on Central Limit Theorem (LCT) is introduced for anomaly detection. Moreover, our extensive experiments evaluate the efficiency of proposed method.
引用
收藏
页码:205 / 214
页数:10
相关论文
共 21 条
[1]  
Anil S., 2013, 2013 4 INT C COMP CO, P1, DOI 10.1109/icccnt.2013.6726604
[2]  
Barford P., 2002, INT MEAS WORKSH
[3]   Applying PCA for Traffic Anomaly Detection: Problems and Solutions [J].
Brauckhoff, Daniela ;
Salamatian, Kave ;
May, Martin .
IEEE INFOCOM 2009 - IEEE CONFERENCE ON COMPUTER COMMUNICATIONS, VOLS 1-5, 2009, :2866-+
[4]   Establishing conditions for the functional central limit theorem in nonlinear and semiparametric time series processes [J].
Davidson, J .
JOURNAL OF ECONOMETRICS, 2002, 106 (02) :243-269
[5]   Outlier detection in multivariate time series by projection pursuit [J].
Galeano, Pedro ;
Pena, Daniel ;
Tsay, Ruey S. .
JOURNAL OF THE AMERICAN STATISTICAL ASSOCIATION, 2006, 101 (474) :654-669
[6]  
He C., 2009, PATT REC 2009 CCPR 2, P1
[7]   Statistical techniques for detecting traffic anomalies through packet header data [J].
Kim, Seong Soo ;
Reddy, A. L. Narasimha .
IEEE-ACM TRANSACTIONS ON NETWORKING, 2008, 16 (03) :562-575
[8]  
Qunhui Z., 2013, J NETWORKS
[9]  
Ratner AS, 2013, 2013 IEEE INTERNATIONAL CONFERENCE ON INTELLIGENCE AND SECURITY INFORMATICS: BIG DATA, EMERGENT THREATS, AND DECISION-MAKING IN SECURITY INFORMATICS, P206, DOI 10.1109/ISI.2013.6578820
[10]   Anomaly Detection Through a Bayesian Support Vector Machine [J].
Sotiris, Vasilis A. ;
Tse, Peter W. ;
Pecht, Michael G. .
IEEE TRANSACTIONS ON RELIABILITY, 2010, 59 (02) :277-286