Skip to main content
Erschienen in: Telecommunication Systems 3/2019

02.07.2018

A comprehensive survey on network anomaly detection

verfasst von: Gilberto Fernandes Jr., Joel J. P. C. Rodrigues, Luiz Fernando Carvalho, Jalal F. Al-Muhtadi, Mario Lemes Proença Jr.

Erschienen in: Telecommunication Systems | Ausgabe 3/2019

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Nowadays, there is a huge and growing concern about security in information and communication technology among the scientific community because any attack or anomaly in the network can greatly affect many domains such as national security, private data storage, social welfare, economic issues, and so on. Therefore, the anomaly detection domain is a broad research area, and many different techniques and approaches for this purpose have emerged through the years. In this study, the main objective is to review the most important aspects pertaining to anomaly detection, covering an overview of a background analysis as well as a core study on the most relevant techniques, methods, and systems within the area. Therefore, in order to ease the understanding of this survey’s structure, the anomaly detection domain was reviewed under five dimensions: (1) network traffic anomalies, (2) network data types, (3) intrusion detection systems categories, (4) detection methods and systems, and (5) open issues. The paper concludes with an open issues summary discussing presently unsolved problems, and final remarks.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
8.
Zurück zum Zitat Barnett, V., & Lewis, T. (1994). Outliers in statistical data (3rd ed.). New York: Wiley. Barnett, V., & Lewis, T. (1994). Outliers in statistical data (3rd ed.). New York: Wiley.
14.
Zurück zum Zitat Yu, Y. (2012). A survey of anomaly intrusion detection techniques. Journal of Computing Sciences in Colleges, 28, 9–17. Yu, Y. (2012). A survey of anomaly intrusion detection techniques. Journal of Computing Sciences in Colleges, 28, 9–17.
20.
Zurück zum Zitat Barford, P., Kline, J., Plonka, D., & Ron, A. (2002). A signal analysis of network traffic anomalies. In Proceedings of the 2nd ACM SIGCOMM workshop on internet measurment—IMW ’02. ACM Press, New York, NY, USA (p. 71). https://doi.org/10.1145/637201.637210. Barford, P., Kline, J., Plonka, D., & Ron, A. (2002). A signal analysis of network traffic anomalies. In Proceedings of the 2nd ACM SIGCOMM workshop on internet measurment—IMW ’02. ACM Press, New York, NY, USA (p. 71). https://​doi.​org/​10.​1145/​637201.​637210.
27.
Zurück zum Zitat Szor, P. (2005). The art of computer virus research and defense. Reading: Addison-Wesley. Szor, P. (2005). The art of computer virus research and defense. Reading: Addison-Wesley.
30.
Zurück zum Zitat Mohana Priya, P., Akilandeswari, V., Mercy Shalinie, S., Lavanya, V., & Shanmuga Priya, M. (2014). The protocol independent detection and classification (PIDC) system for DRDoS attack. In 2014 International conference on recent trends in information technology (ICRTIT) (pp. 1–7). IEEE. https://doi.org/10.1109/ICRTIT.2014.6996154. Mohana Priya, P., Akilandeswari, V., Mercy Shalinie, S., Lavanya, V., & Shanmuga Priya, M. (2014). The protocol independent detection and classification (PIDC) system for DRDoS attack. In 2014 International conference on recent trends in information technology (ICRTIT) (pp. 1–7). IEEE. https://​doi.​org/​10.​1109/​ICRTIT.​2014.​6996154.
36.
Zurück zum Zitat Cabrera, J. B. D., Lewis, L., Qin, X., Lee, W., Prasanth, R. K., Ravichandran, B., & Mehra, R. K. (2001). Proactive detection of distributed denial of service attacks using MIB traffic variables: A feasibility study. In 2001 IEEE/IFIP International symposium on integrated network management proceedings. VII. Integr. Manag. Strateg. New Millenn. (Cat. No. 01EX470) (pp. 609–622). IEEE. https://doi.org/10.1109/INM.2001.918069. Cabrera, J. B. D., Lewis, L., Qin, X., Lee, W., Prasanth, R. K., Ravichandran, B., & Mehra, R. K. (2001). Proactive detection of distributed denial of service attacks using MIB traffic variables: A feasibility study. In 2001 IEEE/IFIP International symposium on integrated network management proceedings. VII. Integr. Manag. Strateg. New Millenn. (Cat. No. 01EX470) (pp. 609–622). IEEE. https://​doi.​org/​10.​1109/​INM.​2001.​918069.
38.
Zurück zum Zitat Lima, M. F., Sampaio, L. D. H., Zarpelao, B. B., Rodrigues, J. J. P. C., Abrao, T., & Proenca, M. L., Jr. (2010). Networking anomaly detection using DSNs and particle swarm optimization with re-clustering. In 2010 IEEE global telecommunications conference GLOBECOM 2010 (pp. 1–6). IEEE. https://doi.org/10.1109/GLOCOM.2010.5683910. Lima, M. F., Sampaio, L. D. H., Zarpelao, B. B., Rodrigues, J. J. P. C., Abrao, T., & Proenca, M. L., Jr. (2010). Networking anomaly detection using DSNs and particle swarm optimization with re-clustering. In 2010 IEEE global telecommunications conference GLOBECOM 2010 (pp. 1–6). IEEE. https://​doi.​org/​10.​1109/​GLOCOM.​2010.​5683910.
39.
44.
Zurück zum Zitat Trammell, B., & Claise, B. (2013). RFC 7011: Specification of the IP flow information export (IPFIX) protocol for the exchange of flow information, 1–53. 2070-1721. Trammell, B., & Claise, B. (2013). RFC 7011: Specification of the IP flow information export (IPFIX) protocol for the exchange of flow information, 1–53. 2070-1721.
51.
Zurück zum Zitat Deri, L., Chou, E., Cherian, Z., Karmarkar, K., & Patterson, M. (2011). Increasing data center network visibility with cisco NetFlow-Lite. In International conference on network and service management (pp. 1–6). Deri, L., Chou, E., Cherian, Z., Karmarkar, K., & Patterson, M. (2011). Increasing data center network visibility with cisco NetFlow-Lite. In International conference on network and service management (pp. 1–6).
54.
Zurück zum Zitat Winter, P., Hermann, E., & Zeilinger, M. (2011). Inductive intrusion detection in flow-based network data using one-class support vector machines. In 2011 4th IFIP international conference on new technologies, mobility and security (pp. 1–5). IEEE. https://doi.org/10.1109/NTMS.2011.5720582. Winter, P., Hermann, E., & Zeilinger, M. (2011). Inductive intrusion detection in flow-based network data using one-class support vector machines. In 2011 4th IFIP international conference on new technologies, mobility and security (pp. 1–5). IEEE. https://​doi.​org/​10.​1109/​NTMS.​2011.​5720582.
65.
73.
Zurück zum Zitat Jolliffe, I. T. (2002). Principal component analysis. Berlin: Springer. Jolliffe, I. T. (2002). Principal component analysis. Berlin: Springer.
74.
Zurück zum Zitat Jackson, J. E. (2005). A user’s guide to principal components. New York: Wiley. Jackson, J. E. (2005). A user’s guide to principal components. New York: Wiley.
78.
84.
Zurück zum Zitat Fernandes, G., Zacaron, A. M., Rodrigues, J. J. P. C., & Proenca, M. L. (2013). Digital signature to help network management using principal component analysis and K-means clustering. In 2013 IEEE international conference on communications (pp. 2519–2523). IEEE. https://doi.org/10.1109/ICC.2013.6654912. Fernandes, G., Zacaron, A. M., Rodrigues, J. J. P. C., & Proenca, M. L. (2013). Digital signature to help network management using principal component analysis and K-means clustering. In 2013 IEEE international conference on communications (pp. 2519–2523). IEEE. https://​doi.​org/​10.​1109/​ICC.​2013.​6654912.
90.
Zurück zum Zitat Proença, M. L., Coppelmans, C., Bottoli, M., Alberti, A., & Mendes, L. S. (2004). The hurst parameter for digital signature of network segment. In J. N. de Souza, P. Dini, & P. Lorenz (Eds.), Telecommunications and networking—ICT 2004 11th international conference on telecommunications, Fortaleza, Brazil, August 1–6, 2004. Proceedings (pp. 772–781). Berlin: Springer. https://doi.org/10.1007/978-3-540-27824-5_103. Proença, M. L., Coppelmans, C., Bottoli, M., Alberti, A., & Mendes, L. S. (2004). The hurst parameter for digital signature of network segment. In J. N. de Souza, P. Dini, & P. Lorenz (Eds.), Telecommunications and networking—ICT 2004 11th international conference on telecommunications, Fortaleza, Brazil, August 1–6, 2004. Proceedings (pp. 772–781). Berlin: Springer. https://​doi.​org/​10.​1007/​978-3-540-27824-5_​103.
98.
Zurück zum Zitat Mazel, J., Casas, P., Labit, Y., & Owezarski, P. (2011). Sub-space clustering, inter-clustering results association and anomaly correlation for unsupervised network anomaly detection. In CNSM ’11 Proceedings of the 7th international conference on network and services management (pp. 73–80). http://dl.acm.org/citation.cfm?id=2147683. Mazel, J., Casas, P., Labit, Y., & Owezarski, P. (2011). Sub-space clustering, inter-clustering results association and anomaly correlation for unsupervised network anomaly detection. In CNSM ’11 Proceedings of the 7th international conference on network and services management (pp. 73–80). http://​dl.​acm.​org/​citation.​cfm?​id=​2147683.
104.
Zurück zum Zitat Estevez-Tapiador, J. M., Garcia-Teodoro, P., & Diaz-Verdejo, J. E. (2003). Stochastic protocol modeling for anomaly based network intrusion detection. In Information assurance. 2003. IWIAS 2003. Proceedings. First IEEE international workshop on (pp. 3–12). https://doi.org/10.1109/IWIAS.2003.1192454. Estevez-Tapiador, J. M., Garcia-Teodoro, P., & Diaz-Verdejo, J. E. (2003). Stochastic protocol modeling for anomaly based network intrusion detection. In Information assurance. 2003. IWIAS 2003. Proceedings. First IEEE international workshop on (pp. 3–12). https://​doi.​org/​10.​1109/​IWIAS.​2003.​1192454.
106.
Zurück zum Zitat Hammerschmidt, C., Marchal, S., State, R., Pellegrino, G., & Verwer, S., (2016). Efficient learning of communication profiles from IP flow records. In 2016 IEEE 41st conference on local computer networks (pp. 559–562). IEEE. https://doi.org/10.1109/LCN.2016.92. Hammerschmidt, C., Marchal, S., State, R., Pellegrino, G., & Verwer, S., (2016). Efficient learning of communication profiles from IP flow records. In 2016 IEEE 41st conference on local computer networks (pp. 559–562). IEEE. https://​doi.​org/​10.​1109/​LCN.​2016.​92.
107.
Zurück zum Zitat Duda, R. O., Hart, P. E., & Stork, D. G. (2012). Pattern classification. New York: Wiley. Duda, R. O., Hart, P. E., & Stork, D. G. (2012). Pattern classification. New York: Wiley.
109.
111.
Zurück zum Zitat Vapnik, V. N. (1995). The nature of statistical learning theory. New York: Springer.CrossRef Vapnik, V. N. (1995). The nature of statistical learning theory. New York: Springer.CrossRef
113.
119.
124.
Zurück zum Zitat Bukhtoyarov, V., & Zhukov, V. (2014). Ensemble-distributed approach in classification problem solution for intrusion detection systems. In E. Corchado, J. A. Lozano, H. Quintián, & H. Yin (Eds.), 2014 15th International conference on intelligent data engineering automated learning—IDEAL, Salamanca, Spain, September 10–12, 2014. Proceedings (pp. 255–265). Cham: Springer. https://doi.org/10.1007/978-3-319-10840-7_32. Bukhtoyarov, V., & Zhukov, V. (2014). Ensemble-distributed approach in classification problem solution for intrusion detection systems. In E. Corchado, J. A. Lozano, H. Quintián, & H. Yin (Eds.), 2014 15th International conference on intelligent data engineering automated learning—IDEAL, Salamanca, Spain, September 10–12, 2014. Proceedings (pp. 255–265). Cham: Springer. https://​doi.​org/​10.​1007/​978-3-319-10840-7_​32.
126.
Zurück zum Zitat Cover, T. M., & Thomas, J. A. (2006). Elements of information theory (2nd ed.). New York: Wiley. Cover, T. M., & Thomas, J. A. (2006). Elements of information theory (2nd ed.). New York: Wiley.
134.
Zurück zum Zitat Li, G., & Wang, Y. (2012). Differential Kullback–Leibler divergence based anomaly detection scheme in sensor networks. In 2012 IEEE 12th international conference on computer and information technology (pp. 966–970). IEEE. https://doi.org/10.1109/CIT.2012.197. Li, G., & Wang, Y. (2012). Differential Kullback–Leibler divergence based anomaly detection scheme in sensor networks. In 2012 IEEE 12th international conference on computer and information technology (pp. 966–970). IEEE. https://​doi.​org/​10.​1109/​CIT.​2012.​197.
139.
Zurück zum Zitat de Castro, L. N., & Timmis, J. (2002). Artificial immune systems: A new computational intelligence approach. London: Springer. de Castro, L. N., & Timmis, J. (2002). Artificial immune systems: A new computational intelligence approach. London: Springer.
141.
Zurück zum Zitat Igbe, O., Darwish, I., & Saadawi, T. (2016). Distributed network intrusion detection systems: An artificial immune system approach. In 2016 IEEE First international conference on connected health: applications, systems and engineering technologies (pp. 101–106). IEEE. https://doi.org/10.1109/CHASE.2016.36. Igbe, O., Darwish, I., & Saadawi, T. (2016). Distributed network intrusion detection systems: An artificial immune system approach. In 2016 IEEE First international conference on connected health: applications, systems and engineering technologies (pp. 101–106). IEEE. https://​doi.​org/​10.​1109/​CHASE.​2016.​36.
144.
Zurück zum Zitat Singh, S., & Kushwah, R. S. (2016). Energy efficient approach for intrusion detection system for WSN by applying optimal clustering and genetic algorithm. In Proceedings of the international conference on advances in information communication technology & computing—AICTC ’16 (pp. 1–6). New York, NY: ACM Press. https://doi.org/10.1145/2979779.2979840. Singh, S., & Kushwah, R. S. (2016). Energy efficient approach for intrusion detection system for WSN by applying optimal clustering and genetic algorithm. In Proceedings of the international conference on advances in information communication technology & computing—AICTC ’16 (pp. 1–6). New York, NY: ACM Press. https://​doi.​org/​10.​1145/​2979779.​2979840.
154.
Zurück zum Zitat Salem, O., Guerassimov, A., Mehaoua, A., Marcus, A., & Furht, B. (2014). Anomaly detection in medical wireless sensor networks using SVM and linear regression models. International Journal of E-Health and Medical Communications, 5, 20–45. https://doi.org/10.4018/ijehmc.2014010102. Salem, O., Guerassimov, A., Mehaoua, A., Marcus, A., & Furht, B. (2014). Anomaly detection in medical wireless sensor networks using SVM and linear regression models. International Journal of E-Health and Medical Communications, 5, 20–45. https://​doi.​org/​10.​4018/​ijehmc.​2014010102.
157.
Zurück zum Zitat Proenca, M. L., Zarpelao, B. B., & Mendes, L. S. (2005). Anomaly detection for network servers using digital signature of network segment. In Advanced industrial conference on telecommunications/service assurance with partial and intermittent resources conference/e-learning on telecommunications workshop (pp. 290–295). IEEE. https://doi.org/10.1109/AICT.2005.26. Proenca, M. L., Zarpelao, B. B., & Mendes, L. S. (2005). Anomaly detection for network servers using digital signature of network segment. In Advanced industrial conference on telecommunications/service assurance with partial and intermittent resources conference/e-learning on telecommunications workshop (pp. 290–295). IEEE. https://​doi.​org/​10.​1109/​AICT.​2005.​26.
Metadaten
Titel
A comprehensive survey on network anomaly detection
verfasst von
Gilberto Fernandes Jr.
Joel J. P. C. Rodrigues
Luiz Fernando Carvalho
Jalal F. Al-Muhtadi
Mario Lemes Proença Jr.
Publikationsdatum
02.07.2018
Verlag
Springer US
Erschienen in
Telecommunication Systems / Ausgabe 3/2019
Print ISSN: 1018-4864
Elektronische ISSN: 1572-9451
DOI
https://doi.org/10.1007/s11235-018-0475-8

Weitere Artikel der Ausgabe 3/2019

Telecommunication Systems 3/2019 Zur Ausgabe

Neuer Inhalt