Mining anomalies using traffic feature distributions

被引:416
作者
Lakhina, A
Crovella, M
Diot, C
机构
[1] Boston Univ, Dept Comp Sci, Boston, MA 02215 USA
[2] Intel Res, Cambridge, England
关键词
anomaly detection; anomaly classification; network-wide traffic analysis;
D O I
10.1145/1090191.1080118
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The increasing practicality of large-scale flow capture makes it possible to conceive of traffic analysis methods that detect and identify a large and diverse set of anomalies. However the challenge of effectively analyzing this massive data source for anomaly diagnosis is as yet unmet. We argue that the distributions of packet features (IP addresses and ports) observed in flow traces reveals both the presence and the structure of a wide range of anomalies. Using entropy as a summarization tool, we show that the analysis of feature distributions leads to significant advances on two fronts: (1) it enables highly sensitive detection of a wide range of anomalies, augmenting detections by volume-based methods, and (2) it enables automatic classification of anomalies via unsupervised learning. We show that using feature distributions, anomalies naturally fall into distinct and meaningful clusters. These clusters can be used to automatically classify anomalies and to uncover new anomaly types. We validate our claims on data from two backbone networks (Abilene and Geant) and conclude that feature distributions show promise as a key element of a fairly general network anomaly diagnosis framework.
引用
收藏
页码:217 / 228
页数:12
相关论文
共 30 条
  • [1] BARFORD P, 2002, INT MEAS WORKSH MARS
  • [2] BRUTLAG J, 2000, USENIX LISA NEW ORL
  • [3] Denning D. E., 1987, IEEE T SOFTWARE ENG
  • [4] Subspace approach to multidimensional fault identification and reconstruction
    Dunia, R
    Qin, SJ
    [J]. AICHE JOURNAL, 1998, 44 (08) : 1813 - 1831
  • [5] ESTAN C, 2003, ACM SIGCOMM KARLSR A
  • [6] Statistical approaches to DDoS attack detection and response
    Feinstein, L
    Schnackenberg, D
    Balupari, R
    Kindred, D
    [J]. DARPA INFORMATION SURVIVABILITY CONFERENCE AND EXPOSITION, VOL I, PROCEEDINGS, 2003, : 303 - 314
  • [7] Deriving traffic demands for operational IP networks: Methodology and experience
    Feldmann, A
    Greenberg, A
    Lund, C
    Reingold, N
    Rexford, J
    True, F
    [J]. IEEE-ACM TRANSACTIONS ON NETWORKING, 2001, 9 (03) : 265 - 279
  • [8] HUSSAIN A, 2003, ACM SIGCOMM KARLSR A
  • [9] JACKSON JE, 1979, TECHNOMETRICS, P331
  • [10] JUNG J, 2002, WWW HAW MAY 2002