Network Traffic Anomaly Detection and Characterization
نویسندگان
چکیده
Network systems need to be able to detect malicious activity and characterize it so that proper actions may be taken. This need is clearly demonstrated through the observed growth rate of informational and economic damage caused by intentionally or unintentionally induced attacks, faults, defects, etc. Network traffic characterization needs to take place accurately and quickly in real time to facilitate prompt appropriate action. Computational and storage resource limits require ingenuity to effectively characterize constantly varying network traffic trends. This paper aims to study network traffic characterization through applying forecasting algorithms to network traffic data and attempting to characterize the aberrations. A series of network traffic anomalies are studied and explained, these explanations are then linked with the specific anomaly’s unique characteristics to expose a set of conditions that distinguish the particular event. This characterization would provide a basis for appropriate responses to network activity.
منابع مشابه
Moving dispersion method for statistical anomaly detection in intrusion detection systems
A unified method for statistical anomaly detection in intrusion detection systems is theoretically introduced. It is based on estimating a dispersion measure of numerical or symbolic data on successive moving windows in time and finding the times when a relative change of the dispersion measure is significant. Appropriate dispersion measures, relative differences, moving windows, as well as tec...
متن کاملAnomaly-based Web Attack Detection: The Application of Deep Neural Network Seq2Seq With Attention Mechanism
Today, the use of the Internet and Internet sites has been an integrated part of the people’s lives, and most activities and important data are in the Internet websites. Thus, attempts to intrude into these websites have grown exponentially. Intrusion detection systems (IDS) of web attacks are an approach to protect users. But, these systems are suffering from such drawbacks as low accuracy in ...
متن کاملSub-Space Clustering, Inter-Clustering Results Association & Anomaly Correlation for Unsupervised Network Anomaly Detection
Network anomaly detection is a critical aspect of network management for instance for QoS, security, etc. The continuous arising of new anomalies and attacks create a continuous challenge to cope with events that put the network integrity at risk. Most network anomaly detection systems proposed so far employ a supervised strategy to accomplish the task, using either signature-based detection me...
متن کاملDenial-of-Service Attack Detection Using Anomaly with Misuse Based Method
Denial-of-Service attack is an attempt to make a system, machine or network resources unavailable to its user by blocking or denying the services. The Denial-of-Service attack is identified with the help of detection algorithm. The anomaly detection mechanism not provides the better results so the user need to implement the hybrid detection algorithm which is the combination of anomaly detectio...
متن کاملSub-Space Clustering and Evidence Accumulation for Unsupervised Network Anomaly Detection
Network anomaly detection has been a hot research topic for many years. Most detection systems proposed so far employ a supervised strategy to accomplish the task, using either signature-based detection methods or supervised-learning techniques. However, both approaches present major limitations: the former fails to detect unknown anomalies, the latter requires training and labeled traffic, whi...
متن کاملAnomaly Detection Using SVM as Classifier and Decision Tree for Optimizing Feature Vectors
Abstract- With the advancement and development of computer network technologies, the way for intruders has become smoother; therefore, to detect threats and attacks, the importance of intrusion detection systems (IDS) as one of the key elements of security is increasing. One of the challenges of intrusion detection systems is managing of the large amount of network traffic features. Removing un...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2004