Mining frequent patterns from network flows for monitoring network

被引:20
|
作者
Li, Xin [1 ]
Deng, Zhi-Hong [1 ]
机构
[1] Peking Univ, Key Lab Machine Percept, Sch Elect Engn & Comp Sci, Beijing 100871, Peoples R China
基金
中国国家自然科学基金;
关键词
Network monitoring; Anomaly detection; Frequent pattern mining; Sliding window;
D O I
10.1016/j.eswa.2010.06.012
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Because of the varying and dynamic characteristics of network traffic, such as fast transfer, huge volume, shot-lived, inestimable and infinite, it is a serious challenge for network administrators to monitor network traffic in real time and judge whether the whole network works well. Currently, most of the existing techniques in this area are based on signature training, learning or matching, which may be too complicated to satisfy timely requirements. Other statistical methods including sampling, hashing or counting are all approximate methods and compute an incomplete set of results. Since the main objective of network monitoring is to discover and understand the active events that happen frequently and may influence or even ruin the total network. So in the paper we aim to use the technique of frequent pattern mining to find out these events. We first design a sliding window model to make sure the mining result novel and integrated; then, under the consideration of the distribution and fluidity of network flows, we develop a powerful class of algorithms that contains vertical re-mining algorithm, multi-pattern re-mining algorithm, fast multi-pattern capturing algorithm and fast multi-pattern capturing supplement algorithm to deal with a series of problems when applying frequent pattern mining algorithm in network traffic analysis. Finally, we develop a monitoring system to evaluate our algorithms on real traces collected from the campus network of Peking University. The results show that some given algorithms are effective enough and our system can definitely identify a lot of potentially very valuable information in time which greatly help network administrators to understand regular applications and detect network anomalies. So the research in this paper not only provides a new application area for frequent pattern mining, but also provides a new technique for network monitoring. Crown Copyright (C) 2010 Published by Elsevier Ltd. All rights reserved.
引用
收藏
页码:8850 / 8860
页数:11
相关论文
共 50 条
  • [31] Mining Frequent Trajectory Patterns from Online Footprints
    Huang, Qunying
    Li, Zhenlong
    Li, Jing
    Chang, Charles
    PROCEEDINGS OF THE 7TH ACM SIGSPATIAL INTERNATIONAL WORKSHOP ON GEOSTREAMING (IWGS) 2016, 2016, : 71 - 77
  • [32] Mining frequent patterns with wildcards from biological sequences
    He, Yu
    Wu, Xindong
    Zhu, Xingquan
    Arslan, Abdullah N.
    IRI 2007: PROCEEDINGS OF THE 2007 IEEE INTERNATIONAL CONFERENCE ON INFORMATION REUSE AND INTEGRATION, 2007, : 329 - +
  • [33] Mining frequent query patterns from XML queries
    Yang, LH
    Lee, ML
    Hsu, W
    Acharya, S
    EIGHTH INTERNATIONAL CONFERENCE ON DATABASE SYSTEMS FOR ADVANCED APPLICATIONS, PROCEEDINGS, 2003, : 355 - 362
  • [34] Mining frequent ordered patterns
    Deng, ZH
    Ji, CR
    Zhang, M
    Tang, SW
    ADVANCES IN KNOWLEDGE DISCOVERY AND DATA MINING, PROCEEDINGS, 2005, 3518 : 150 - 154
  • [35] Mining Supplemental Frequent Patterns
    Liu, Yintian
    Liu, Yingming
    Zeng, Tao
    Xu, Kaikuo
    Tang, Rong
    ADVANCED DATA MINING AND APPLICATIONS, PROCEEDINGS, 2008, 5139 : 158 - +
  • [36] Mining Host Behavior Patterns From Massive Network and Security Logs
    Ya, Jing
    Liu, Tingwen
    Li, Quangang
    Shi, Jinqiao
    Zhang, Haoliang
    Lv, Pin
    Guo, Li
    INTERNATIONAL CONFERENCE ON COMPUTATIONAL SCIENCE (ICCS 2017), 2017, 108 : 38 - 47
  • [37] Bayesian dynamic modeling and monitoring of network flows
    Chen, Xi
    Banks, David
    West, Mike
    NETWORK SCIENCE, 2019, 7 (03) : 292 - 318
  • [38] Big social network mining for following patterns
    20160501869578
    (1) University of Manitoba, Winnipeg; MB, Canada; (2) Ritsumeikan University, Kusatsu, Japan, 1600, BytePress.org; Concordia University; ConfSys.org; Keio University (Association for Computing Machinery, 2 Penn Plaza, Suite 701, New York, NY 10121-0701, United States): : 13 - 17
  • [39] Social Network Mining and Analytics for Quantitative Patterns
    Hryhoruk, Connor C. J.
    Leung, Carson K.
    Pazdor, Adam G. M.
    PROCEEDINGS OF THE 2023 IEEE/ACM INTERNATIONAL CONFERENCE ON ADVANCES IN SOCIAL NETWORKS ANALYSIS AND MINING, ASONAM 2023, 2023, : 727 - 734
  • [40] Mining of reuse patterns in CDMA network optimization
    Ye, Wen
    Cui, Hongxu
    SNPD 2007: EIGHTH ACIS INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING, ARTIFICIAL INTELLIGENCE, NETWORKING, AND PARALLEL/DISTRIBUTED COMPUTING, VOL 3, PROCEEDINGS, 2007, : 1011 - +