Automatic Detection of Computer Network Traffic Anomalies based on Eccentricity Analysis

被引:0
|
作者
Martins, Rodrigo Siqueira [1 ]
Angelov, Plamen [2 ]
Jales Costa, Bruno Sielly [3 ,4 ]
机构
[1] Fed Inst Rio Grande do Norte, Campus Parnamirim, Parnamirim, Brazil
[2] Univ Lancaster, Sch Comp & Commun, Lancaster, England
[3] Fed Inst Rio Grande do Norte, Campus Natal Zona Norte, Natal, RN, Brazil
[4] Ford Motor Co, Res & Innovat Ctr, Palo Alto, CA USA
来源
2018 IEEE INTERNATIONAL CONFERENCE ON FUZZY SYSTEMS (FUZZ-IEEE) | 2018年
关键词
typicality; eccentricity; TEDA; anomaly detection; real time; computer networks; live migration;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
In this paper, we propose an approach to automatic detection of attacks on computer networks using data that combine the traffic generated with 'live' intra-cloud virtual-machine (VM) migration. The method used in this work is the recently introduced typicality and eccentricity data analytics (TEDA)framework. We compare the results of applying TEDA with the traditionally used methods such as statistical analysis, such as k-means clustering. One of the biggest challenges in computer network analysis using statistical or numerical methods is the fact that the protocols information is composed of integer/string values and, thus, not easy to handle by traditional pattern recognition methods that deal with real values. In this study we consider as features the tuple {IP source, IP destination, Port source and Port destination} extracted from the network flow data in addition to the traditionally used real values that represent the number of packets per time or quantity of bytes per time. Using entropy of the IP data helps to convert the integer raw data into real valued signatures. The proposed solution permit to build a real-time anomaly detection system and reduce the number of information that is necessary for evaluation. In general, the systems based on traffic are fast and are used in real time but they do not produce good results in attacks that produce a flow hidden within the background traffic or within a high traffic that is produced by other application. We validate our approach an a dataset which includes attacks on the network port scan (NPS) and network scan (NS) that permit hidden flow within the normal traffic and see this attacks together with live migration which produces a higher traffic flow.
引用
收藏
页数:8
相关论文
共 50 条
  • [41] Network Traffic Anomaly Detection based on Apache Spark
    Pwint, Phyo Htet
    Shwe, Thanda
    2019 INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION TECHNOLOGIES (ICAIT), 2019, : 222 - 226
  • [42] A machine learning-based workflow for automatic detection of anomalies in machine tools
    Zuefle, Marwin
    Moog, Felix
    Lesch, Veronika
    Krupitzer, Christian
    Kounev, Samuel
    ISA TRANSACTIONS, 2022, 125 : 445 - 458
  • [43] Application of Histogram-Based Outlier Scores to Detect Computer Network Anomalies
    Paulauskas, Nerijus
    Baskys, Algirdas
    ELECTRONICS, 2019, 8 (11)
  • [44] Periodicity-Based Anomalies in Self-Similar Network Traffic Flow Measurements
    Akgul, Tayfun
    Baykut, Suleyman
    Erol-Kantarci, Melike
    Oktug, Sema F.
    IEEE TRANSACTIONS ON INSTRUMENTATION AND MEASUREMENT, 2011, 60 (04) : 1358 - 1366
  • [45] Internet Threat Detection in Smart Grids Based on Network Traffic Analysis Using LSTM, IF, and SVM
    Stryczek, Szymon
    Natkaniec, Marek
    ENERGIES, 2023, 16 (01)
  • [46] Application in Anomaly Detection of Network Traffic Based on Fractal Technology
    He, Yuemei
    Wang, Baomin
    Qiao, Dejun
    MECHANICAL ENGINEERING AND INTELLIGENT SYSTEMS, PTS 1 AND 2, 2012, 195-196 : 987 - 991
  • [47] Data-Driven Network Analysis for Anomaly Traffic Detection
    Alam, Shumon
    Alam, Yasin
    Cui, Suxia
    Akujuobi, Cajetan
    SENSORS, 2023, 23 (19)
  • [48] Unsupervised network traffic anomaly detection based on score iterations
    Ping G.
    Zeng T.
    Ye X.
    Qinghua Daxue Xuebao/Journal of Tsinghua University, 2022, 62 (05): : 819 - 824
  • [49] Using Generalized Entropies and OC-SVM with Mahalanobis Kernel for Detection and Classification of Anomalies in Network Traffic
    Santiago-Paz, Jayro
    Torres-Roman, Deni
    Figueroa-Ypina, Angel
    Argaez-Xool, Jesus
    ENTROPY, 2015, 17 (09) : 6239 - 6257
  • [50] HADOOP-BASED NETWORK TRAFFIC ANOMALY DETECTION IN BACKBONE
    Yu, Jishen
    Liu, Feng
    Zhou, Wenli
    Yu, Hua
    2014 IEEE 3rd International Conference on Cloud Computing and Intelligence Systems (CCIS), 2014, : 140 - 145