Skip to main content

2020 | OriginalPaper | Buchkapitel

GAMPAL: Anomaly Detection for Internet Backbone Traffic by Flow Prediction with LSTM-RNN

verfasst von : Taku Wakui, Takao Kondo, Fumio Teraoka

Erschienen in: Machine Learning for Networking

Verlag: Springer International Publishing

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

This paper proposes a general-purpose anomaly detection mechanism for Internet backbone traffic named GAMPAL (General-purpose Anomaly detection Mechanism using Path Aggregate without Labeled data). GAMPAL does not require labeled data to achieve a general-purpose anomaly detection. For scalability to the number of entries in the BGP RIB (Routing Information Base), GAMPAL introduces path aggregates. The BGP RIB entries are classified into the path aggregates, each of which is identified with the first three AS numbers in the AS_PATH attribute. GAMPAL establishes a prediction model of traffic throughput based on past traffic throughput. It adopts the LSTM-RNN (Long Short-Term Memory Recurrent Neural Network) model focusing on periodicity in weekly scale of the Internet traffic pattern. The validity of GAMPAL is evaluated using the real traffic information and the BGP RIB exported from the WIDE backbone network (AS2500), a nation-wide backbone network for research and educational organizations in Japan. As a result, GAMPAL successfully detects traffic increases due to events and DDoS attacks targeted to a stub organization.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Liao, H., Lin, C.R., Lin, Y., Tung, K.: Intrusion detection system: a comprehensive review. J. Netw. Comput. Appl. 36(1), 16–24 (2016)CrossRef Liao, H., Lin, C.R., Lin, Y., Tung, K.: Intrusion detection system: a comprehensive review. J. Netw. Comput. Appl. 36(1), 16–24 (2016)CrossRef
2.
Zurück zum Zitat Kumar, R., Sharma, D.: HyINT: signature-anomaly intrusion detection system. In: Proceedings of ICCCNT 2018, pp. 1–7 (2018) Kumar, R., Sharma, D.: HyINT: signature-anomaly intrusion detection system. In: Proceedings of ICCCNT 2018, pp. 1–7 (2018)
3.
Zurück zum Zitat Kwon, J., Leea, J., Lee, H., Perrig, A.: PsyBoG: a scalable botnet detection method for large-scale DNS traffic. Comput. Netw. 97, 48–73 (2016)CrossRef Kwon, J., Leea, J., Lee, H., Perrig, A.: PsyBoG: a scalable botnet detection method for large-scale DNS traffic. Comput. Netw. 97, 48–73 (2016)CrossRef
4.
Zurück zum Zitat Tang, T.A., Mhamdi, L., McLernon, D., Zaidi, S., Ghogho, M.: Deep recurrent neural network for intrusion detection in SDN-based networks. In: Proceedings of IEEE NetSoft 2018, pp. 202–206 (2018) Tang, T.A., Mhamdi, L., McLernon, D., Zaidi, S., Ghogho, M.: Deep recurrent neural network for intrusion detection in SDN-based networks. In: Proceedings of IEEE NetSoft 2018, pp. 202–206 (2018)
5.
Zurück zum Zitat Ibidunmoye, O., Rezaie, A., Elmroth, E.: Adaptive anomaly detection in performance metric streams. IEEE Trans. Netw. Serv. Manag. 15(1), 217–231 (2018)CrossRef Ibidunmoye, O., Rezaie, A., Elmroth, E.: Adaptive anomaly detection in performance metric streams. IEEE Trans. Netw. Serv. Manag. 15(1), 217–231 (2018)CrossRef
6.
Zurück zum Zitat Chen, S., Chen, Y., Tzeng, W.: Effective botnet detection through neural networks on convolutional features. In: Proceedings of IEEE TrustCom/BigDataSE 2018, pp. 372–378 (2018) Chen, S., Chen, Y., Tzeng, W.: Effective botnet detection through neural networks on convolutional features. In: Proceedings of IEEE TrustCom/BigDataSE 2018, pp. 372–378 (2018)
7.
Zurück zum Zitat Petrie, C., King, T.: Multi-Threaded Routing Toolkit (MRT) routing information export format with BGP additional path extensions. RFC 8050, sl IETF (2017) Petrie, C., King, T.: Multi-Threaded Routing Toolkit (MRT) routing information export format with BGP additional path extensions. RFC 8050, sl IETF (2017)
11.
Zurück zum Zitat Flanagan, K., Fallon, E., Jacob, P., Awad, A., Connolly, P.: 2D2N: a dynamic degenerative neural network for classification of images of live network data. In: Proceeding of IEEE CCNC 2019, pp. 1–7 (2019) Flanagan, K., Fallon, E., Jacob, P., Awad, A., Connolly, P.: 2D2N: a dynamic degenerative neural network for classification of images of live network data. In: Proceeding of IEEE CCNC 2019, pp. 1–7 (2019)
13.
Zurück zum Zitat Kathareios, G., Anghel, A., Mate, A., Clauberg, R., Gusat, M.: Catch it if you can: real-time network anomaly detection with low false alarm rates. In: Proceedings of IEEE (ICMLA 2017), pp. 924–929 (2017) Kathareios, G., Anghel, A., Mate, A., Clauberg, R., Gusat, M.: Catch it if you can: real-time network anomaly detection with low false alarm rates. In: Proceedings of IEEE (ICMLA 2017), pp. 924–929 (2017)
14.
Zurück zum Zitat Cho, K., Fukuda, K., Esaki, H., Kato, A.: The impact and implications of the growth in residential user-to-user traffic. In: Proceedings of ACM SIGCOMM 2006, pp. 207–218 (2006) Cho, K., Fukuda, K., Esaki, H., Kato, A.: The impact and implications of the growth in residential user-to-user traffic. In: Proceedings of ACM SIGCOMM 2006, pp. 207–218 (2006)
Metadaten
Titel
GAMPAL: Anomaly Detection for Internet Backbone Traffic by Flow Prediction with LSTM-RNN
verfasst von
Taku Wakui
Takao Kondo
Fumio Teraoka
Copyright-Jahr
2020
DOI
https://doi.org/10.1007/978-3-030-45778-5_13