A Novel Sequence Tensor Recovery Algorithm for Quick and Accurate Anomaly Detection

被引:9
|
作者
Huang, Wenbin [1 ]
Xie, Kun [1 ]
Li, Jie [2 ]
机构
[1] Hunan Univ, Coll Comp Sci & Elect Engn, Changsha 410082, Hunan, Peoples R China
[2] Cent South Univ Forestry & Technol, Sch Comp & Informat Engn, Changsha 410004, Peoples R China
来源
IEEE TRANSACTIONS ON NETWORK SCIENCE AND ENGINEERING | 2022年 / 9卷 / 05期
基金
中国国家自然科学基金;
关键词
Network security; Sequence traffic monitor; Online anomaly detection; Tensor recovery; RANK APPROXIMATION; MATRIX COMPLETION;
D O I
10.1109/TNSE.2022.3189365
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
Anomalous traffic detection is a vital task in advanced Internet supervision and maintenance. To detect anomalies accurately, various data representations, such as vectors, matrices, and tensors, have been adopted to model traffic data. Among them, tensor-based methods outperform others due to their capability of capturing comprehensive correlations between complex network traffic. However, existing tensor-based algorithms remain certain shortcomings, such as working offline, cannot timely detect traffic anomalies, and high computation costs. To conquer the aforementioned deficiencies, we propose a novel sequence tensor recovery (STR) algorithm in this paper, which utilizes the results of historical tensor decomposition to achieve quick and accurate anomaly detection with low consumption when traffic data series arrive. Furthermore, we propose a dynamic sequence tensor recovery (DSTR) algorithm to improve anomaly detection accuracy by better capturing the variation over time of the comprehensive correlation of traffic data hidden in the tensor structure. The experimental results on two real traffic traces, Abilene and GE ANT, indicate the proposed STR and DSTR algorithms are superior to the state-of-the-art algorithms in terms of accuracy and computation cost.
引用
收藏
页码:3531 / 3545
页数:15
相关论文
共 34 条
  • [21] A novel hierarchical matching algorithm for intrusion detection systems
    Sheu, TF
    Huang, NF
    Lee, HP
    GLOBECOM '05: IEEE GLOBAL TELECOMMUNICATIONS CONFERENCE, VOLS 1-6: DISCOVERY PAST AND FUTURE, 2005, : 1691 - 1695
  • [22] The Influence of Salp Swarm Algorithm-Based Feature Selection on Network Anomaly Intrusion Detection
    Alsaleh, Alanoud
    Binsaeedan, Wojdan
    IEEE ACCESS, 2021, 9 : 112466 - 112477
  • [23] A fast anomaly detection system using probabilistic artificial immune algorithm capable of learning new attacks
    Mohammadi M.
    Akbari A.
    Raahemi B.
    Nassersharif B.
    Asgharian H.
    Evolutionary Intelligence, 2014, 6 (03) : 135 - 156
  • [24] Two-stage Detection Algorithm for RoQ attack Based on Localized Periodicity Analysis of Traffic Anomaly
    Wen, Kun
    Yang, Jiahai
    Cheng, Fengjuan
    Li, Chenxi
    Wang, Ziyu
    Yin, Hui
    2014 23RD INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATION AND NETWORKS (ICCCN), 2014,
  • [25] An efficient network anomaly detection scheme based on TCM-KNN algorithm and data reduction mechanism
    Li, Yang
    Guo, Li
    2007 IEEE INFORMATION ASSURANCE WORKSHOP, 2007, : 221 - +
  • [26] Smooth Robust Tensor Completion for Background/Foreground Separation with Missing Pixels: Novel Algorithm with Convergence Guarantee
    Shen, Bo
    Xie, Weijun
    Kong, Zhenyu
    JOURNAL OF MACHINE LEARNING RESEARCH, 2022, 23
  • [27] The Use of Hierarchical Temporal Memory and Temporal Sequence Encoder for Online Anomaly Detection in Industrial Cyber-Physical Systems
    Malits, Roman
    Mendelson, Avi
    WATER, 2025, 17 (03)
  • [28] Online anomaly detection algorithm based on deep support vector data description using incremental centroid update
    Lee, Kibae
    Ko, Guhn Hyeok
    Lee, Chong Hyun
    JOURNAL OF THE ACOUSTICAL SOCIETY OF KOREA, 2022, 41 (02): : 199 - 209
  • [29] A Novel Nonconvex Low-Rank Tensor Completion Approach for Traffic Sensor Data Recovery From Incomplete Measurements
    Chen, Xiaobo
    Wang, Kaiyuan
    Li, Zuoyong
    Zhang, Yu
    Ye, Qiaolin
    IEEE TRANSACTIONS ON INSTRUMENTATION AND MEASUREMENT, 2023, 72
  • [30] N-GAN: a novel anomaly-based network intrusion detection with generative adversarial networks
    Iliyasu A.S.
    Deng H.
    International Journal of Information Technology, 2022, 14 (7) : 3365 - 3375