Anomaly Extraction in Backbone Networks Using Association Rules

被引:57
作者
Brauckhoff, Daniela [1 ]
Dimitropoulos, Xenofontas [2 ]
Wagner, Arno [1 ]
Salamatian, Kave [3 ]
机构
[1] ETH, Dept Comp, CH-8092 Zurich, Switzerland
[2] ETH, Dept Informat Technol & Elect Engn, CH-8092 Zurich, Switzerland
[3] Univ Savoie Chambery Annecy, LISTIC PolyTech, F-74944 Annecy Le Vieux, France
关键词
Association rules; computer networks; data mining; detection algorithms; PATTERNS;
D O I
10.1109/TNET.2012.2187306
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Anomaly extraction refers to automatically finding, in a large set of flows observed during an anomalous time interval, the flows associated with the anomalous event(s). It is important for root-cause analysis, network forensics, attack mitigation, and anomaly modeling. In this paper, we use meta-data provided by several histogram-based detectors to identify suspicious flows, and then apply association rule mining to find and summarize anomalous flows. Using rich traffic data from a backbone network, we show that our technique effectively finds the flows associated with the anomalous event(s) in all studied cases. In addition, it triggers a very small number of false positives, on average between 2 and 8.5, which exhibit specific patterns and can be trivially sorted out by an administrator. Our anomaly extraction method significantly reduces the work-hours needed for analyzing alarms, making anomaly detection systems more practical.
引用
收藏
页码:1788 / 1799
页数:12
相关论文
共 36 条
[1]  
Agrawal R., P 20 INT C VERY LARG
[2]  
[Anonymous], 2008, ACM Trans. Knowl. Discov., DOI DOI 10.1145/1324172.1324174DATA
[3]  
[Anonymous], P INFOCOM
[4]  
[Anonymous], 2005, P 5 ACM SIGCOMM C IN
[5]  
Balachander K., 2003, P 3 ACM SIGCOMM C IN, P234, DOI [DOI 10.1145/948205.948236, 10.1145/948205.948236]
[6]  
Barford P, 2002, IMW 2002: PROCEEDINGS OF THE SECOND INTERNET MEASUREMENT WORKSHOP, P71, DOI 10.1145/637201.637210
[7]  
Brauckhoff D, 2009, IMC'09: PROCEEDINGS OF THE 2009 ACM SIGCOMM INTERNET MEASUREMENT CONFERENCE, P28
[8]   Applying PCA for Traffic Anomaly Detection: Problems and Solutions [J].
Brauckhoff, Daniela ;
Salamatian, Kave ;
May, Martin .
IEEE INFOCOM 2009 - IEEE CONFERENCE ON COMPUTER COMMUNICATIONS, VOLS 1-5, 2009, :2866-+
[9]   Summarization - compressing data into an informative representation [J].
Chandola, Varun ;
Kumar, Vipin .
KNOWLEDGE AND INFORMATION SYSTEMS, 2007, 12 (03) :355-378
[10]   What's new: Finding significant differences in network data streams [J].
Cormode, G ;
Muthukrishnan, S .
IEEE-ACM TRANSACTIONS ON NETWORKING, 2005, 13 (06) :1219-1232