Multi-dimensional traffic anomaly detection based on ICA

被引:0
作者
Li Zonglin [1 ]
Hu Guangmin [1 ]
Yao Xingmiao [1 ]
机构
[1] Univ Elect Sci & Technol China, Key Lab Broadband Opt Fiber Transmiss & Commun Ne, Chengdu 610054, Peoples R China
来源
ISCC: 2009 IEEE SYMPOSIUM ON COMPUTERS AND COMMUNICATIONS, VOLS 1 AND 2 | 2009年
关键词
D O I
暂无
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
Some network anomalous events caused by same reason (e.g., DDoS, link failure) tend to present similar unusual change on multiple traffic observations, and this part of traffic usually exhibits anomalous features either on time or frequency domain. Motivated by this fact, this paper introduces a multidimensional traffic anomaly detection method based on independent component analysis (ICA). Considering traffic observation as a mixture of normal and anomaly that respectively generated by different reasons, we generalize ICA technology of blind sources separation problem to separate the potentially anomalous part from characteristics of individual traffic signal on time and frequent domain. We show that how principle component analysis is combined with sliding window analysis, to measure the degree of similarity among multiple abnormal parts with fine granularity. The evaluation using Abilene trace shows that our method is useful to detect anomalous traffic with small volume, and performs better than previous method.
引用
收藏
页码:333 / 336
页数:4
相关论文
共 8 条
[1]  
Barford P., 2002, ACM INT MEAS WORKSH
[2]  
CHHABRA P, 2008, DISTRIBUTED SPATIAL
[3]  
GUANT X, 2007, MONITORING ABNORMAL
[4]   A fast fixed-point algorithm for independent component analysis [J].
Hyvarinen, A ;
Oja, E .
NEURAL COMPUTATION, 1997, 9 (07) :1483-1492
[5]  
Lakhina A, 2005, P ACM SIGCOMM AUG
[6]  
Lakhina A, 2004, P ACM SIGCOMM AUG
[7]  
LAKHINA A, 2005, FLOCON 2005 AN WORKS
[8]   Non-Gaussian and long memory statistical characterizations for Internet traffic with anomalies [J].
Scherrer, Antoine ;
Larrieu, Nicolas ;
Owezarski, Philippe ;
Borgnat, Pierre ;
Abry, Patrice .
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2007, 4 (01) :56-70