skip to main content
10.1145/2695664.2695852acmconferencesArticle/Chapter ViewAbstractPublication PagessacConference Proceedingsconference-collections
research-article

Statistical, forecasting and metaheuristic techniques for network anomaly detection

Published:13 April 2015Publication History

ABSTRACT

Traffic monitoring is an arduous task and requires mechanisms to proactively detect anomalous events that may harm the proper functioning of computer networks. Since the emergence of network management, several approaches have been developed to address this issue. In this paper, we examine and compare three methods used for anomaly detection: the statistical procedure Principal Component Analysis, the Ant Colony Optimization metaheuristic and the AutoRegressive Integrated Moving Average forecasting method. Experimental results on traffic collected at the backbone of a University network demonstrate high confidence in detection accuracy.

References

  1. Scorpius - sflow anomaly simulator, 2013. http://redes.dc.uel.br/scorpius, Access date: 10.06.2014.Google ScholarGoogle Scholar
  2. M. Bhuyan, D. Bhattacharyya, and J. Kalita. Network anomaly detection: Methods, systems and tools. Communications Surveys Tutorials, IEEE, 16(1):303--336, First 2014.Google ScholarGoogle ScholarCross RefCross Ref
  3. G. Box, G. Jenkins, and G. Reinsel. Time Series Analysis: Forecasting and Control. Wiley Series in Probability and Statistics. Wiley, 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. L. Carvalho, J. Rodrigues, S. Barbon, and M. Lemes Proenca. Using ant colony optimization metaheuristic and dynamic time warping for anomaly detection. In Software, Telecommunications and Computer Networks (SoftCOM), 2013 21st International Conference on, pages 1--5, Sept 2013.Google ScholarGoogle Scholar
  5. S. Chang, X. Qiu, Z. Gao, K. Liu, and F. Qi. A flow-based anomaly detection method using sketch and combinations of traffic features. In Network and Service Management (CNSM), 2010 International Conference on, pages 302--305, Oct 2010.Google ScholarGoogle ScholarCross RefCross Ref
  6. B. Claise, B. Trammell, and P. Aitken. Specification of the ip flow information export (ipfix) protocol for the exchange of flow information. RFC 7011, Sept. 2013.Google ScholarGoogle Scholar
  7. N. C. da Costa, D. Krause, and O. Bueno. Paraconsistent logics and paraconsistency. In D. Jacquette, editor, Philosophy of Logic, Handbook of the Philosophy of Science, pages 791--911. North-Holland, Amsterdam, 2007.Google ScholarGoogle ScholarCross RefCross Ref
  8. M. V. de Assis, J. J. Rodrigues, and M. L. P. Jr. A seven-dimensional flow analysis to help autonomous network management. Information Sciences, 278(0):900--913, 2014.Google ScholarGoogle ScholarCross RefCross Ref
  9. M. Dorigo, M. Birattari, and T. Stutzle. Ant colony optimization. Computational Intelligence Magazine, IEEE, 1(4):28--39, nov. 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. T. Fawcett. An introduction to roc analysis. Pattern Recogn. Lett., 27(8):861--874, June 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. G. Fernandes Jr., A. Zacaron, J. Rodrigues, and M. Lemes Proença Jr. Digital signature to help network management using principal component analysis and k-means clustering. In Communications (ICC), 2013 IEEE International Conference on, pages 2519--2523, June 2013.Google ScholarGoogle ScholarCross RefCross Ref
  12. R. Fontugne and K. Fukuda. A hough-transform-based anomaly detector with an adaptive time interval. SIGAPP Appl. Comput. Rev., 11(3):41--51, Aug. 2011. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. W. Ford. Chapter 19 - the symmetric eigenvalue problem. In W. Ford, editor, Numerical Linear Algebra with Applications, pages 439--468. Academic Press, Boston, 2015.Google ScholarGoogle Scholar
  14. H. Jiang, Q. Yu, and Y. Gong. An improved ant colony clustering algorithm. In Biomedical Engineering and Informatics (BMEI), 2010 3rd International Conference on, volume 6, pages 2368--2372, oct. 2010.Google ScholarGoogle ScholarCross RefCross Ref
  15. I. Jolliffe. Principal component analysis. Springer Verlag, New York, 2002.Google ScholarGoogle Scholar
  16. L. Kuang and M. Zulkernine. An anomaly intrusion detection method using the csi-knn algorithm. In Proceedings of the 2008 ACM Symposium on Applied Computing, SAC '08, pages 921--926, New York, NY, USA, 2008. ACM. Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. A. Lakhina, M. Crovella, and C. Diot. Diagnosing network-wide traffic anomalies. In Proceedings of the SIGCOMM '04, pages 219--230, New York, NY, USA, 2004. ACM. Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. M. Navas and C. Ordonez. Efficient computation of pca with svd in sql. In Proceedings of the 2Nd Workshop on Data Mining Using Matrices and Tensors, DMMT '09, pages 5:1--5:10, New York, NY, USA, 2009. ACM. Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. I. C. Paschalidis and Y. Chen. Statistical anomaly detection with sensor networks. ACM Trans. Sen. Netw., 7(2):17:1--17:23, Sept. 2010. Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. E. H. M. Pena, S. Barbon, Jr., J. J. P. C. Rodrigues, and M. L. Proenca, Jr. Anomaly detection using digital signature of network segment with adaptive arima model and paraconsistent logic. In Comp. and Comm. (ISCC), 2014 IEEE Symposium on, June 2014.Google ScholarGoogle ScholarCross RefCross Ref
  21. H. Sakoe and S. Chiba. Dynamic programming algorithm optimization for spoken word recognition. Acoustics, Speech and Signal Processing, IEEE Transactions on, 26(1):43--49, feb 1978.Google ScholarGoogle Scholar
  22. L. I. Smith. A tutorial on principal components analysis. Technical report, Cornell University, USA, February 26 2002.Google ScholarGoogle Scholar
  23. B. B. Zarpelão, L. D. S. Mendes, and M. L. Proença, Jr. Anomaly detection aiming pro-active management of computer network based on digital signature of network segment. J. Netw. Syst. Manage., 15(2):267--283, June 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Statistical, forecasting and metaheuristic techniques for network anomaly detection

      Recommendations

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in
      • Published in

        cover image ACM Conferences
        SAC '15: Proceedings of the 30th Annual ACM Symposium on Applied Computing
        April 2015
        2418 pages
        ISBN:9781450331968
        DOI:10.1145/2695664

        Copyright © 2015 ACM

        Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        • Published: 13 April 2015

        Permissions

        Request permissions about this article.

        Request Permissions

        Check for updates

        Qualifiers

        • research-article

        Acceptance Rates

        SAC '15 Paper Acceptance Rate291of1,211submissions,24%Overall Acceptance Rate1,650of6,669submissions,25%

      PDF Format

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader