skip to main content
10.1145/1162678.1162684acmotherconferencesArticle/Chapter ViewAbstractPublication PagescommConference Proceedingsconference-collections
Article
Free Access

Toward sophisticated detection with distributed triggers

Published:11 September 2006Publication History

ABSTRACT

Recent research has proposed efficient protocols for distributed triggers, which can be used in monitoring infrastructures to maintain system-wide invariants and detect abnormal events with minimal communication overhead. To date, however, this work has been limited to simple thresholds on distributed aggregate functions like sums and counts. In this paper, we present our initial results that show how to use these simple threshold triggers to enable sophisticated anomaly detection in near-real time, with modest communication overheads. We design a distributed protocol to detect "unusual traffic patterns" buried in an Origin-Destination network flow matrix that: a) uses a Principal Components Analysis decomposition technique to detect anomalies via a threshold function on residual signals [10]; and b) efficiently tracks this threshold function in near-real time using a simple distributed protocol. In addition, we speculate that such simple thresholding can be a powerful tool for a variety of monitoring tasks beyond the one presented here, and we propose an agenda to explore additional sophisticated applications.

References

  1. Babcock, B. and Olston, C. Distributed Top-K Monitoring. In ACM SIGMOD, (2003). Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. Clark, D., Partridge, C., Ramming, J. C., and Wroclawski, J. T. A knowledge plane for the internet. In ACM SIGCOMM (2003). Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. Hanson, E. N., Bodagala, S., and Chadaga., U. Trigger condition testing and view maintenance using optimized discrimination network. IEEE TKDE, 14(2) (2002). Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. Huang, L., Garofalakis, M., Joseph, A. and Taft, N. Communication-efficient tracking of distributed triggers. Tech. rep., February 2006.Google ScholarGoogle Scholar
  5. Huebsch, R., Hellerstein, J., Lanham, N., Loo, B.-T., Shenker, S. and Stoica, I. Querying the internet with pier. In VLDB (2003). Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. Jain, A., Hellerstein, J. M., Ratnasamy, S., and Wetherall, D. A wakeup call for internet monitoring systems: The case for distributed triggers. In HotNets (2004).Google ScholarGoogle Scholar
  7. Jain, A., Chang, E. Y., and Wang, Y.-F. Adaptive stream resource management using kalman filters. In ACM SIGMOD (2004). Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. Jackson, J. E. and Mudholkar, G. S. Control procedures for residuals associated with principal component analysis. In Technometrics, pages 341--349, 1979.Google ScholarGoogle ScholarCross RefCross Ref
  9. Keralapura, R., Cormode, G. and Ramamirtham, J. Communication-efficient distributed monitoring of thresholded counts. In ACM SIGMOD (2006). Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. Lakhina, A., Crovella, M. and Diot, C. Diagnosing network-wide traffic anomalies. In ACM SIGCOMM, (2004). Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. Lakhina, A., Papagiannaki, K., Crovella, M., Diot, C., Kolaczyk, E. D. and Taft, N. Structural analysis of network traffic flows. In ACM SIGMETRICS, (2004). Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. Olston, C., Jiang, J., and Widom, J. Adaptive filters for continuous queries over distributed data streams. In ACM SIGMOD (2003). Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. Padmanabhan, V. N., Ramabhadran, S., and Padhye, J. Netprofiler: Profiling wide-area networks using peer cooperation. In IPTPS (2005). Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. Spring, N., Wetherall, D., and Anderson, T. Scriptroute: A facility for distributed internet measurement. In USITS (2003).Google ScholarGoogle Scholar
  15. Widom, J., and S. Ceri. Active Database Systems: Triggers and Rules for Advanced Database Processing. Morgan Kaufmann, 1996. Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. Xie, Y., Kim, H.-A., O'hallaron, D. R., Reiter, M. K., and Zhang, H. Seurat: A pointillist approach to anomaly detection. In RAID (2004).Google ScholarGoogle Scholar
  17. Yegneswaran, V., Barford, P., and Jha, S. Global intrusion detection in the domino overlay system. In NDSS (2004).Google ScholarGoogle Scholar
  18. Zhang, Y., Ge, Z.-H., Greenberg, A., and Roughan, M. Network anomography. In IMC, (2005). Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Toward sophisticated detection with distributed triggers

        Recommendations

        Comments

        Login options

        Check if you have access through your login credentials or your institution to get full access on this article.

        Sign in
        • Published in

          cover image ACM Other conferences
          MineNet '06: Proceedings of the 2006 SIGCOMM workshop on Mining network data
          September 2006
          66 pages
          ISBN:159593569X
          DOI:10.1145/1162678

          Copyright © 2006 ACM

          Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

          Publisher

          Association for Computing Machinery

          New York, NY, United States

          Publication History

          • Published: 11 September 2006

          Permissions

          Request permissions about this article.

          Request Permissions

          Check for updates

          Qualifiers

          • Article

        PDF Format

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader