Improving PCA-based anomaly detection by using multiple time scale analysis and Kullback-Leibler divergence

被引:21
作者
Callegari, Christian [1 ]
Gazzarrini, Loris [1 ]
Giordano, Stefano [1 ]
Pagano, Michele [1 ]
Pepe, Teresa [1 ]
机构
[1] Univ Pisa, Dept Informat Engn, Pisa, Italy
关键词
anomaly detection; K-L divergence; multiple time scale; PCA; INTRUSION DETECTION;
D O I
10.1002/dac.2432
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
The increasing number of network attacks causes growing problems for network operators and users. Thus, detecting anomalous traffic is of primary interest in IP networks management. In this paper, we address the problem considering a method based on PCA for detecting network anomalies. In more detail, this paper presents a new technique that extends the state of the art in PCA-based anomaly detection. Indeed, by means of multi-scale analysis and Kullback-Leibler divergence, we are able to obtain great improvements with respect to the performance of the 'classical' approach. Moreover, we also introduce a method for identifying the flows responsible for an anomaly detected at the aggregated level. The performance analysis, presented in this paper, demonstrates the effectiveness of the proposed method. Copyright (C) 2012 John Wiley & Sons, Ltd.
引用
收藏
页码:1731 / 1751
页数:21
相关论文
共 20 条
[1]  
Adami D, 2010, IEEE ICC
[2]  
[Anonymous], 2004, IMC
[3]  
Bouzida Y, 2004, 3 C SEC ARCH RES
[4]   Improving network anomaly detection effectiveness via an integrated multi-metric-multi-link (M3L) PCA-based approach [J].
Chatzigiannakis, V. ;
Papavassiliou, S. ;
Androulidakis, G. .
SECURITY AND COMMUNICATION NETWORKS, 2009, 2 (03) :289-304
[5]   Effective allied network security system based on designed scheme with conditional legitimate probability against distributed network attacks and intrusions [J].
Chen, Ruey-Maw ;
Hsieh, Kuo-Ta .
INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2012, 25 (05) :672-688
[6]  
Claise B., 2004, Tech. Rep.
[7]   An improved data stream summary: the count-min sketch and its applications [J].
Cormode, G ;
Muthukrishnan, S .
JOURNAL OF ALGORITHMS-COGNITION INFORMATICS AND LOGIC, 2005, 55 (01) :58-75
[8]   Intrusion detection and tolerance: A global scheme [J].
Djemaiel, Yacine ;
Rekhis, Slim ;
Boudriga, Noureddine .
INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2008, 21 (02) :211-230
[9]   Diagnosing network-wide traffic anomalies [J].
Lakhina, A ;
Crovella, M ;
Diot, C .
ACM SIGCOMM COMPUTER COMMUNICATION REVIEW, 2004, 34 (04) :219-230
[10]  
Lakhina A., 2004, Performance Evaluation Review, V32, P61, DOI 10.1145/1012888.1005697