Automatic Detection of Computer Network Traffic Anomalies based on Eccentricity Analysis

被引:0
|
作者
Martins, Rodrigo Siqueira [1 ]
Angelov, Plamen [2 ]
Jales Costa, Bruno Sielly [3 ,4 ]
机构
[1] Fed Inst Rio Grande do Norte, Campus Parnamirim, Parnamirim, Brazil
[2] Univ Lancaster, Sch Comp & Commun, Lancaster, England
[3] Fed Inst Rio Grande do Norte, Campus Natal Zona Norte, Natal, RN, Brazil
[4] Ford Motor Co, Res & Innovat Ctr, Palo Alto, CA USA
来源
2018 IEEE INTERNATIONAL CONFERENCE ON FUZZY SYSTEMS (FUZZ-IEEE) | 2018年
关键词
typicality; eccentricity; TEDA; anomaly detection; real time; computer networks; live migration;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
In this paper, we propose an approach to automatic detection of attacks on computer networks using data that combine the traffic generated with 'live' intra-cloud virtual-machine (VM) migration. The method used in this work is the recently introduced typicality and eccentricity data analytics (TEDA)framework. We compare the results of applying TEDA with the traditionally used methods such as statistical analysis, such as k-means clustering. One of the biggest challenges in computer network analysis using statistical or numerical methods is the fact that the protocols information is composed of integer/string values and, thus, not easy to handle by traditional pattern recognition methods that deal with real values. In this study we consider as features the tuple {IP source, IP destination, Port source and Port destination} extracted from the network flow data in addition to the traditionally used real values that represent the number of packets per time or quantity of bytes per time. Using entropy of the IP data helps to convert the integer raw data into real valued signatures. The proposed solution permit to build a real-time anomaly detection system and reduce the number of information that is necessary for evaluation. In general, the systems based on traffic are fast and are used in real time but they do not produce good results in attacks that produce a flow hidden within the background traffic or within a high traffic that is produced by other application. We validate our approach an a dataset which includes attacks on the network port scan (NPS) and network scan (NS) that permit hidden flow within the normal traffic and see this attacks together with live migration which produces a higher traffic flow.
引用
收藏
页数:8
相关论文
共 50 条
  • [31] PCA-Based Network Traffic Anomaly Detection
    Meimei Ding
    Hui Tian
    Tsinghua Science and Technology, 2016, 21 (05) : 500 - 509
  • [32] Network Traffic Anomaly Detection based on Ratio and Volume
    Kim, Hyun Joo
    Na, Jung C.
    Jang, Jong S.
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2006, 6 (5B): : 190 - 193
  • [33] PCA-Based Network Traffic Anomaly Detection
    Ding, Meimei
    Tian, Hui
    TSINGHUA SCIENCE AND TECHNOLOGY, 2016, 21 (05) : 500 - 509
  • [34] Network traffic anomaly detection method based on chaotic neural network
    Sheng, Shaojun
    Wang, Xin
    ALEXANDRIA ENGINEERING JOURNAL, 2023, 77 : 567 - 579
  • [35] Neural network-based detection of virtual environment anomalies
    Nantes, Alfredo
    Brown, Ross
    Maire, Frederic
    NEURAL COMPUTING & APPLICATIONS, 2013, 23 (06) : 1711 - 1728
  • [36] Network anomaly traffic detection algorithm based on SVM
    Lei, Yang
    2017 INTERNATIONAL CONFERENCE ON ROBOTS & INTELLIGENT SYSTEM (ICRIS), 2017, : 217 - 220
  • [37] Neural network-based detection of virtual environment anomalies
    Alfredo Nantes
    Ross Brown
    Frederic Maire
    Neural Computing and Applications, 2013, 23 : 1711 - 1728
  • [38] Network Traffic Anomaly Detection based on Catastrophe Theory
    Xiong, Wei
    Xiong, Naixue
    Yang, Laurence T.
    Vasilakos, Athanasios V.
    Wang, Qian
    Hu, Hanping
    2010 IEEE GLOBECOM WORKSHOPS, 2010, : 2070 - 2074
  • [39] Network Traffic Anomaly Detection Based on Generative Adversarial Network and Transformer
    Wang, Zhurong
    Zhou, Jing
    Hei, Xinhong
    ADVANCES IN NATURAL COMPUTATION, FUZZY SYSTEMS AND KNOWLEDGE DISCOVERY, ICNC-FSKD 2022, 2023, 153 : 228 - 235
  • [40] Detecting anomalies in backbone network traffic: a performance comparison among several change detection methods
    Callegari, Christian
    Giordano, Stefano
    Pagano, Michele
    Pepe, Teresa
    INTERNATIONAL JOURNAL OF SENSOR NETWORKS, 2012, 11 (04) : 205 - 214