Automatic Detection of Computer Network Traffic Anomalies based on Eccentricity Analysis

被引:0
|
作者
Martins, Rodrigo Siqueira [1 ]
Angelov, Plamen [2 ]
Jales Costa, Bruno Sielly [3 ,4 ]
机构
[1] Fed Inst Rio Grande do Norte, Campus Parnamirim, Parnamirim, Brazil
[2] Univ Lancaster, Sch Comp & Commun, Lancaster, England
[3] Fed Inst Rio Grande do Norte, Campus Natal Zona Norte, Natal, RN, Brazil
[4] Ford Motor Co, Res & Innovat Ctr, Palo Alto, CA USA
来源
2018 IEEE INTERNATIONAL CONFERENCE ON FUZZY SYSTEMS (FUZZ-IEEE) | 2018年
关键词
typicality; eccentricity; TEDA; anomaly detection; real time; computer networks; live migration;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
In this paper, we propose an approach to automatic detection of attacks on computer networks using data that combine the traffic generated with 'live' intra-cloud virtual-machine (VM) migration. The method used in this work is the recently introduced typicality and eccentricity data analytics (TEDA)framework. We compare the results of applying TEDA with the traditionally used methods such as statistical analysis, such as k-means clustering. One of the biggest challenges in computer network analysis using statistical or numerical methods is the fact that the protocols information is composed of integer/string values and, thus, not easy to handle by traditional pattern recognition methods that deal with real values. In this study we consider as features the tuple {IP source, IP destination, Port source and Port destination} extracted from the network flow data in addition to the traditionally used real values that represent the number of packets per time or quantity of bytes per time. Using entropy of the IP data helps to convert the integer raw data into real valued signatures. The proposed solution permit to build a real-time anomaly detection system and reduce the number of information that is necessary for evaluation. In general, the systems based on traffic are fast and are used in real time but they do not produce good results in attacks that produce a flow hidden within the background traffic or within a high traffic that is produced by other application. We validate our approach an a dataset which includes attacks on the network port scan (NPS) and network scan (NS) that permit hidden flow within the normal traffic and see this attacks together with live migration which produces a higher traffic flow.
引用
收藏
页数:8
相关论文
共 50 条
  • [21] Malicious Network Traffic Detection Based on Deep Neural Networks and Association Analysis
    Gao, Minghui
    Ma, Li
    Liu, Heng
    Zhang, Zhijun
    Ning, Zhiyan
    Xu, Jian
    SENSORS, 2020, 20 (05)
  • [22] Network traffic analysis over clustering-based collective anomaly detection
    Wang, Chonghua
    Zhou, Hao
    Hao, Zhiqiang
    Hu, Shu
    Li, Jun
    Zhang, Xueying
    Jiang, Bo
    Chen, Xuehong
    COMPUTER NETWORKS, 2022, 205
  • [23] An Anomaly Detection and Analysis Method for Network Traffic Based on Correlation Coefficient Matrix
    Chen, Ning
    Chen, Xiao-Su
    Xiong, Bing
    Lu, Hong-Wei
    2009 INTERNATIONAL CONFERENCE ON SCALABLE COMPUTING AND COMMUNICATIONS & EIGHTH INTERNATIONAL CONFERENCE ON EMBEDDED COMPUTING, 2009, : 238 - 244
  • [24] Smart Grid Communication Network Traffic Anomaly Detection Based on Entropy Analysis
    Ruo, Xuesong
    Lv, Chao
    Pei, Pei
    Gao, Minghui
    Wang, Liming
    2016 2ND IEEE INTERNATIONAL CONFERENCE ON COMPUTER AND COMMUNICATIONS (ICCC), 2016, : 1082 - 1086
  • [25] An Continuous Wavelet Transform-Based Detection Approach to Traffic Anomalies
    Jiang, Dingde
    Yao, Cheng
    Xu, Zhengzheng
    Zhang, Peng
    Yuan, Zhen
    Qin, Wenda
    MECHANICAL AND ELECTRONICS ENGINEERING III, PTS 1-5, 2012, 130-134 : 2098 - 2102
  • [26] Framework for automatic detection of anomalies in DevOps
    Fawzy, Ahmed Hany
    Wassif, Khaled
    Moussa, Hanan
    JOURNAL OF KING SAUD UNIVERSITY-COMPUTER AND INFORMATION SCIENCES, 2023, 35 (03) : 8 - 19
  • [27] Detecting anomalies from big network traffic data using an adaptive detection approach
    Zhang, Ji
    Li, Hongzhou
    Gao, Qigang
    Wang, Hai
    Luo, Yonglong
    INFORMATION SCIENCES, 2015, 318 : 91 - 110
  • [28] Detection and Classification of Traffic Anomalies Using Microscopic Traffic Variables
    Barria, Javier A.
    Thajchayapong, Suttipong
    IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS, 2011, 12 (03) : 695 - 704
  • [29] Diagnosing network-wide traffic anomalies
    Lakhina, A
    Crovella, M
    Diot, C
    ACM SIGCOMM COMPUTER COMMUNICATION REVIEW, 2004, 34 (04) : 219 - 230
  • [30] Towards Detection and Mitigation of Traffic Anomalies in SDN
    Kausar, Nabeela
    Latif, Zohaib
    Lee, Choonhwa
    Iqbal, Umer
    12TH INTERNATIONAL CONFERENCE ON ICT CONVERGENCE (ICTC 2021): BEYOND THE PANDEMIC ERA WITH ICT CONVERGENCE INNOVATION, 2021, : 728 - 731