Detecting Anomalies in Massive Traffic Streams Based on S-Transform Analysis of Summarized Traffic Entropies

被引:0
作者
Pukkawanna, Sirikarn [1 ]
Hazeyama, Hiroaki [1 ]
Kadobayashi, Youki [1 ]
Yamaguchi, Suguru [1 ]
机构
[1] Nara Inst Sci & Technol, Grad Sch Informat Sci, Nara 6300192, Japan
关键词
anomaly detection; sketch; entropy; time-frequency analysis; S-transform;
D O I
10.1587/transinf.2014NTP0006
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Detecting traffic anomalies is an indispensable component of overall security architecture. As Internet and traffic data with more sophisticated attacks grow exponentially, preserving security with signature-based traffic analyzers or analyzers that do not support massive traffic are not sufficient. In this paper, we propose a novel method based on combined sketch technique and S-transform analysis for detecting anomalies in massive traffic streams. The method does not require any prior knowledge such as attack patterns and models representing normal traffic behavior. To detect anomalies, we summarize the entropy of traffic data over time and maintain the summarized data in sketches. The entropy fluctuation of the traffic data aggregated to the same bucket is observed by S-transform to detect spectral changes referred to as anomalies in this work. We evaluated the performance of the method with real-world backbone traffic collected at the United States and Japan transit link in terms of both accuracy and false positive rates. We also explored the method parameters' influence on detection performance. Furthermore, we compared the performance of our method to S-transform-based and Wavelet-based methods. The results demonstrated that our method was capable of detecting anomalies and overcame both methods. We also found that our method was not sensitive to its parameter settings.
引用
收藏
页码:588 / 595
页数:8
相关论文
共 25 条
[1]  
[Anonymous], P IEEE C GLOB TEL
[2]  
[Anonymous], 2007, P GI ITG WORKSH MMBN
[3]  
Barford P, 2002, IMW 2002: PROCEEDINGS OF THE SECOND INTERNET MEASUREMENT WORKSHOP, P71, DOI 10.1145/637201.637210
[4]   Combining sketches and wavelet analysis for multi time-scale network anomaly detection [J].
Callegari, C. ;
Giordano, S. ;
Pagano, M. ;
Pepe, T. .
COMPUTERS & SECURITY, 2011, 30 (08) :692-704
[5]  
Callegari C., 2011, Communications (ICC), 2011 IEEE International Conference on, IEEE, P1, DOI DOI 10.1109/ICC.2011.5962595
[6]  
Callegari C., 2010, P 6 INT WIR COMM MOB, P331
[7]  
Callegari C, 2013, IEEE CONF COMM NETW, P350, DOI 10.1109/CNS.2013.6682725
[8]  
Callison-Burch C., 2010, P NAACL HLT 2010 WOR
[9]  
Huang C.-T., 2008, International Journal of Network Security, V6, P309
[10]   ADMIRE: Anomaly detection method using entropy-based PCA with three-step sketches [J].
Kanda, Yoshiki ;
Fontugne, Romain ;
Fukuda, Kensuke ;
Sugawara, Toshiharu .
COMPUTER COMMUNICATIONS, 2013, 36 (05) :575-588