Anomaly Detection and Attribution in Networks With Temporally Correlated Traffic

被引:68
作者
Nevat, Ido [1 ]
Divakaran, Dinil Mon [2 ]
Nagarajan, Sai Ganesh [2 ]
Zhang, Pengfei [3 ]
Su, Le [2 ]
Ko, Li Ling [4 ]
Thing, Vrizlynn L. L. [2 ]
机构
[1] TUM CREATE, Singapore 138602, Singapore
[2] A STAR Inst Infocomm Res, Cyber Secur & Intelligence Dept, Singapore 138632, Singapore
[3] Univ Oxford, Dept Engn Sci, Oxford OX1 3PJ, England
[4] Univ Notre Dame, Dept Math, Notre Dame, IN 46556 USA
基金
新加坡国家研究基金会;
关键词
Anomaly detection; network traffic; likelihood ratio test; Markov chain; cross entropy method; STATISTICAL-INFERENCE;
D O I
10.1109/TNET.2017.2765719
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
080201 [机械制造及其自动化];
摘要
Anomaly detection in communication networks is the first step in the challenging task of securing a network, as anomalies may indicate suspicious behaviors, attacks, network malfunctions, or failures. In this paper, we address the problem of not only detecting the anomalous events but also of attributing the anomaly to the flows causing it. To this end, we develop a new statistical decision theoretic framework for temporally correlated traffic in networks via Markov chain modeling. We first formulate the optimal anomaly detection problem via the generalized likelihood ratio test (GLRT) for our composite model. This results in a combinatorial optimization problem which is prohibitively expensive. We then develop two low-complexity anomaly detection algorithms. The first is based on the cross entropy (CE) method, which detects anomalies as well as attributes anomalies to flows. The second algorithm performs anomaly detection via GLRT on the aggregated flows transformation-a compact low-dimensional representation of the raw traffic flows. The two algorithms complement each other and allow the network operator to first activate the flow aggregation algorithm in order to quickly detect anomalies in the system. Once an anomaly has been detected, the operator can further investigate which specific flows are anomalous by running the CE-based algorithm. We perform extensive performance evaluations and experiment our algorithms on synthetic and semi-synthetic data, as well as on real Internet traffic data obtained from the MAWI archive, and finally make recommendations regarding their usability.
引用
收藏
页码:131 / 144
页数:14
相关论文
共 39 条
[1]
STATISTICAL-INFERENCE ABOUT MARKOV-CHAINS [J].
ANDERSON, TW ;
GOODMAN, LA .
ANNALS OF MATHEMATICAL STATISTICS, 1957, 28 (01) :89-110
[2]
[Anonymous], 1998, FUNDEMENTALS STAT SI
[3]
[Anonymous], 2013, CROSS ENTROPY METHOD
[4]
Bolton RJ, 2002, STAT SCI, V17, P235
[5]
Seven Years and One Day: Sketching the Evolution of Internet Traffic [J].
Borgnat, Pierre ;
Dewaele, Guillaume ;
Fukuda, Kensuke ;
Abry, Patrice ;
Cho, Kenjiro .
IEEE INFOCOM 2009 - IEEE CONFERENCE ON COMPUTER COMMUNICATIONS, VOLS 1-5, 2009, :711-+
[6]
A new statistical method for detecting network anomalies in TCP traffic [J].
Callegari, Christian ;
Vaton, Sandrine ;
Pagano, Michele .
EUROPEAN TRANSACTIONS ON TELECOMMUNICATIONS, 2010, 21 (07) :575-588
[7]
Distribution-based anomaly detection via generalized likelihood ratio test: A general Maximum Entropy approach [J].
Coluccia, A. ;
D'Alconzo, A. ;
Ricciato, F. .
COMPUTER NETWORKS, 2013, 57 (17) :3446-3462
[8]
Convergence properties of the cross-entropy method for discrete optimization [J].
Costa, Andre ;
Jones, Owen Dafydd ;
Kroese, Dirk .
OPERATIONS RESEARCH LETTERS, 2007, 35 (05) :573-580
[9]
Dembo A., 2009, LARGE DEVIATIONS TEC, V38
[10]
Gu Y., 2005, ACM SIGCOMM C INT ME, P32, DOI [10.1145/1330107.1330148, DOI 10.1145/1330107.1330148]