Evaluation of Anomaly Detection Method Based on Pattern Recognition

被引:9
作者
Fontugne, Romain [1 ]
Himura, Yosuke [2 ]
Fukuda, Kensuke [1 ,3 ]
机构
[1] Grad Univ Adv Studies, Tokyo 1018430, Japan
[2] Univ Tokyo, Tokyo 1138656, Japan
[3] JST, Natl Inst Informat, PRESTO, Tokyo 1018430, Japan
关键词
anomaly detection; pattern recognition; Internet traffic;
D O I
10.1587/transcom.E93.B.328
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
The number of threats on the Internet is rapidly increasing, and anomaly detection has become of increasing importance. High-speed backbone traffic is particularly degraded. but their analysis is a complicated task due to the amount of data, the lack of payload data. the asymmetric routing and the use of sampling techniques. Most anomaly detection schemes focus Oil the statistical properties of network traffic and highlight anomalous traffic through their singularities. In this paper, we concentrate on unusual traffic distributions, which are easily identifiable in temporal-spatial space (e.g., time/address or port). We present ail anomaly detection method that uses a pattern recognition technique to identify anomalies ill picture,,; representing traffic. The main advantage of this method is its ability to detect attacks involving mice flows. We evaluate the parameter set and the effectiveness of this approach by analyzing six years of Internet traffic collected from a trans-Pacific link, We show several examples of detected anomalies and compare our results with those of two other methods. The comparison indicates that the only anomalies detected by the pattern-recognition-based method are mainly malicious traffic with a few packets.
引用
收藏
页码:328 / 335
页数:8
相关论文
共 12 条
[1]  
Barford P, 2002, IMW 2002: PROCEEDINGS OF THE SECOND INTERNET MEASUREMENT WORKSHOP, P71, DOI 10.1145/637201.637210
[2]  
BORGNAT P, 2009, 7 YEARS ONE DAY SKET
[3]  
Cho K, 2000, USENIX ASSOCIATION PROCEEDINGS OF THE FREENIX TRACK, P263
[4]  
DEWAELE G, 2007, EXTRACTING HIDDEN AN, P145
[5]   USE OF HOUGH TRANSFORMATION TO DETECT LINES AND CURVES IN PICTURES [J].
DUDA, RO ;
HART, PE .
COMMUNICATIONS OF THE ACM, 1972, 15 (01) :11-&
[6]  
FONTUGNE R, 2008, IMAGE PROCESSING APP, P17
[7]   BLINC: Multilevel traffic classification in the dark [J].
Karagiannis, T ;
Papagiannaki, K ;
Faloutsos, M .
ACM SIGCOMM COMPUTER COMMUNICATION REVIEW, 2005, 35 (04) :229-240
[8]  
Kim H., 2008, INTERNET TRAFFIC CLA
[9]  
KIM SS, 2005, STUDY ANAL NETWORK T, P2056
[10]  
LAKHINA A, 2005, MINING ANOMALIES USI, P217