Real Time Distributed Analysis of MPLS Network Logs for Anomaly Detection

被引:0
作者
Macit, Muhammet [1 ]
Delibas, Emrullah [1 ]
Karanlik, Bahtiyar [1 ]
Yazilim, Alperen Inal Sekom [1 ]
Aytekin, Tevfik [2 ]
机构
[1] Masaldan Merkezi, Kisikli Mah, Alemdag Cad 60,C Blok,D 8, TR-34662 Istanbul, Turkey
[2] Bahcesehir Univ, Dept Comp Engn, TR-34353 Istanbul, Turkey
来源
NOMS 2016 - 2016 IEEE/IFIP NETWORK OPERATIONS AND MANAGEMENT SYMPOSIUM | 2016年
关键词
MPLS networks; log mining; anomaly detection; streaming data;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Large scale IP networks contain thousands of network devices such as routers and switches. Massive amounts of logging data is generated by these devices. Analysing this data is both a challenge and an opportunity for finding network problems. Moreover, large IP networks contain devices from different vendors, so it is important to build a system which can work with network devices of different brands. In this study we describe a distributed architecture which can retrieve, store, and process massive amounts of network logging data in real time. Using this architecture we also build a basic anomaly detection system. The system statistically models cumulative counts of logs for different event types for all the devices in the network. The statistical approach lets the system to detect deviations from the normal behaviour without consulting expert knowledge. Our evaluations show that the system effectively handles massive amounts of data and detects anomalies.
引用
收藏
页码:750 / 753
页数:4
相关论文
共 14 条
  • [1] [Anonymous], 2010, P 10 ACM SIGCOMM C I
  • [2] [Anonymous], 2005, KDD, DOI [10.1145/1081870.1081927, DOI 10.1145/1081870.1081927]
  • [3] Network Anomaly Detection: Methods, Systems and Tools
    Bhuyan, Monowar H.
    Bhattacharyya, D. K.
    Kalita, J. K.
    [J]. IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2014, 16 (01): : 303 - 336
  • [4] Gerhards R., 2009, 5424 RFC IETF
  • [5] Outlier Detection for Temporal Data: A Survey
    Gupta, Manish
    Gao, Jing
    Aggarwal, Charu C.
    Han, Jiawei
    [J]. IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, 2014, 26 (09) : 2250 - 2267
  • [6] Jie Chu, 2012, Research in Attacks, Intrusions, and Defenses. Proceedings of the 15th International Symposium, RAID 2012, P294, DOI 10.1007/978-3-642-33338-5_15
  • [7] Makanju A, 2013, 2013 IFIP/IEEE INTERNATIONAL SYMPOSIUM ON INTEGRATED NETWORK MANAGEMENT (IM 2013), P962
  • [8] Nasir MAU, 2015, PROC INT CONF DATA, P137, DOI 10.1109/ICDE.2015.7113279
  • [9] Advances and Challenges in Log Analysis
    Oliner, Adam
    Ganapathi, Archana
    Xu, Wei
    [J]. COMMUNICATIONS OF THE ACM, 2012, 55 (02) : 63 - 69
  • [10] Potharaju R., 2013, P INT MEAS C IMC, P9