期刊文献+

Diagnosing Traffic Anomalies Using a Two-Phase Model 被引量:1

Diagnosing Traffic Anomalies Using a Two-Phase Model
原文传递
导出
摘要 Network traffic anomalies are unusual changes in a network,so diagnosing anomalies is important for network management.Feature-based anomaly detection models (ab)normal network traffic behavior by analyzing packet header features.PCA-subspace method (Principal Component Analysis) has been verified as an efficient feature-based way in network-wide anomaly detection.Despite the powerful ability of PCA-subspace method for network-wide traffic detection,it cannot be effectively used for detection on a single link.In this paper,different from most works focusing on detection on flow-level traffic,based on observations of six traffic features for packet-level traffic,we propose a new approach B6SVM to detect anomalies for packet-level traffic on a single link.The basic idea of B6-SVM is to diagnose anomalies in a multi-dimensional view of traffic features using Support Vector Machine (SVM).Through two-phase classification,B6-SVM can detect anomalies with high detection rate and low false alarm rate.The test results demonstrate the effectiveness and potential of our technique in diagnosing anomalies.Further,compared to previous feature-based anomaly detection approaches,B6-SVM provides a framework to automatically identify possible anomalous types.The framework of B6-SVM is generic and therefore,we expect the derived insights will be helpful for similar future research efforts. Network traffic anomalies are unusual changes in a network,so diagnosing anomalies is important for network management.Feature-based anomaly detection models (ab)normal network traffic behavior by analyzing packet header features.PCA-subspace method (Principal Component Analysis) has been verified as an efficient feature-based way in network-wide anomaly detection.Despite the powerful ability of PCA-subspace method for network-wide traffic detection,it cannot be effectively used for detection on a single link.In this paper,different from most works focusing on detection on flow-level traffic,based on observations of six traffic features for packet-level traffic,we propose a new approach B6SVM to detect anomalies for packet-level traffic on a single link.The basic idea of B6-SVM is to diagnose anomalies in a multi-dimensional view of traffic features using Support Vector Machine (SVM).Through two-phase classification,B6-SVM can detect anomalies with high detection rate and low false alarm rate.The test results demonstrate the effectiveness and potential of our technique in diagnosing anomalies.Further,compared to previous feature-based anomaly detection approaches,B6-SVM provides a framework to automatically identify possible anomalous types.The framework of B6-SVM is generic and therefore,we expect the derived insights will be helpful for similar future research efforts.
出处 《Journal of Computer Science & Technology》 SCIE EI CSCD 2012年第2期313-327,共15页 计算机科学技术学报(英文版)
基金 supported by the National Basic Research 973 Program of China under Grant No. 2009CB320505 the National Science and Technology Supporting Plan of China under Grant No. 2008BAH37B05 the National Natural Science Foundation of China under Grant No. 61170211 the Ph.D. Programs Foundation of Ministry of Education of China under Grant No. 20110002110056 the National High Technology Research and Development 863 Program of China under Grant Nos. 2008AA01A303 and 2009AA01Z251
关键词 anomaly detection entropy support vector machine classification traffic feature anomaly detection,entropy,support vector machine,classification,traffic feature
  • 相关文献

参考文献43

  • 1http://www.symantec.com/.
  • 2Lakhina A, Crovella M, Diot C. Mining anomalies using traffic feature distributions. In Pmc. ACM SIGCOMM, Philadelphia, USA, Aug. 22-26, 2005, pp.217-228.
  • 3Ahmed T, Coates M, Lakhina A. Multivariate online anomaly detection using kernel recursive least squares. In Proc, IEEE INFO COM, Anchorage, Alaska, USA, May 6-12, 2007, pp.625-633.
  • 4Brauckhoff D, Salamatian K, May M. Applying PCA for traffic anomaly detection: Problems and solutions. In Proc. INFOCOM, Rio de Janeiro, Brazil, Apr. 19-25, 2009, pp.2866- 2870.
  • 5Li X, Bian F, Crovella M, Diot C, Govindan R, Iannaccone G, Lakhina A. Detection and identification of network anomalies using sketch subspaces. In Proc. IMC, Rio de Janeiro, Brazil, Oct. 25-27, 2006, pp.147-152.
  • 6Liu Y, Zhang L, Guan Y. Sketch-based streaming PCA algorithm for network-wide traffic anomaly detection. In Proc. the 30th International Conference on Distributed Computing Systems, Genova, Italy, Jun. 21-25, 2010, pp.807-816.
  • 7Rubinstein B I P, Nelson B, Huang L et al. Antidote: Understanding and defending against poisoning of anomaly detectors. In Proc, the 9th Internet Measurement Conference, Chicago, USA, Nov. 4-6, 2009, pp.I-14.
  • 8Feinstein L, Schnackenberg D, Balupari R, Kindred D. Statistical approaches to DDos attack detection and response. In Proc. DARPA Information Survivability Conference and Exposition (DISCEX), Washington DC, USA, Apr. 22-24, 2003, pp.303-314.
  • 9Nychis G, Sekar V, Andersen D G, Kim H, Zhang H. An empirical evaluation of entropy-based traffic anomaly detection. In Proc, the 8th IMC, Vouliagmeni, Greece, Oct. 20-22, 2008, pp.151-156.
  • 10Vapnik V. The Nature of Statistical Learning Theory. New York: Springer, 1995.

同被引文献11

  • 1Microsoft MSDN Library. Windows Sockets2 (Windows) [ EB/OL]. [2012 - 10 - 26]. http://msdn, microsoft, com/en-us/library/win- dows/desktop/ms740673 ( v = vs. 85). aspx.
  • 2Microsoft MSDN Library. About WinINet [ EB/OL]. [ 2012 - 10 - 26 ]. http://msdn, microsoft, com/en-us/library/aa383630 ( VS. 85). aspx.
  • 3Microsoft MSDN Library. About WinHTrP [EB/OL]. [2012 - 1 0 - 26]. http://msdn, microsoft, com/en-us/library/aa383630 ( VS. 85). aspx.
  • 4NICHOLAS N. Dynamic binary analysis and instrumentation or building tools is easy [ D]. Cambridge: University of Cambridge, 2004.
  • 5SION B. Pin - a dynamic binary instrumentation tool [ EB/OL]. [ 2012 - 06 - 13]. http://www, pintool, org/.
  • 6赵天福,周丹平,王康,等.一种基于网络行为分析的反弹式木马检测方法[C]//第26次全国计算机安全学术交流会议论文集.北京:中国学术期刊电子出版社,2011:80-83.
  • 7段刚.加密与解密[M].3版.北京:电子工业出版社,2010:121-126.
  • 8肖枫涛,王维,刘波,陈新.一种基于进程流量行为的蠕虫检测系统[J].计算机工程与科学,2011,33(4):19-24. 被引量:1
  • 9应凌云,杨轶,冯登国,苏璞睿.恶意软件网络协议的语法和行为语义分析方法[J].软件学报,2011,22(7):1676-1689. 被引量:23
  • 10王乾,舒辉,李洋,黄荷洁.基于DynamoRIO的恶意代码行为分析[J].计算机工程,2011,37(18):139-141. 被引量:6

引证文献1

二级引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部