Reservoir-based network traffic stream summarization for anomaly detection

2017 ◽  
Vol 21 (2) ◽  
pp. 579-599 ◽  
Author(s):  
Mohiuddin Ahmed
2021 ◽  
Author(s):  
Esmaeil Zadeh ◽  
Stephen Amstutz ◽  
James Collins ◽  
Craig Ingham ◽  
Marian Gheorghe ◽  
...  

We present a contextual anomaly detection methodology utilised for the capacity management process of a managed service provider that administers networks for large enterprises. We employ an ensemble of forecasts to identify anomalous network traffic. Stream of observations, upon their arrival, are compared against these baseline forecasts and alerts generated only if the anomalies are sustained. The results confirm that our approach significantly reduces false alerts, triggering rather more accurate and meaningful alerts to a level that could be proactively consumed by a small team. We believe our methodology makes a useful contribution to the applications enabling proactive capacity management.


2021 ◽  
Author(s):  
Shiwei Wang ◽  
Haizhou Du ◽  
Lin Liu ◽  
Zhenyu Lin

Author(s):  
Juma Ibrahim ◽  
Slavko Gajin

Entropy-based network traffic anomaly detection techniques are attractive due to their simplicity and applicability in a real-time network environment. Even though flow data provide only a basic set of information about network communications, they are suitable for efficient entropy-based anomaly detection techniques. However, a recent work reported a serious weakness of the general entropy-based anomaly detection related to its susceptibility to deception by adding spoofed data that camouflage the anomaly. Moreover, techniques for further classification of the anomalies mostly rely on machine learning, which involves additional complexity. We address these issues by providing two novel approaches. Firstly, we propose an efficient protection mechanism against entropy deception, which is based on the analysis of changes in different entropy types, namely Shannon, R?nyi, and Tsallis entropies, and monitoring the number of distinct elements in a feature distribution as a new detection metric. The proposed approach makes the entropy techniques more reliable. Secondly, we have extended the existing entropy-based anomaly detection approach with the anomaly classification method. Based on a multivariate analysis of the entropy changes of multiple features as well as aggregation by complex feature combinations, entropy-based anomaly classification rules were proposed and successfully verified through experiments. Experimental results are provided to validate the feasibility of the proposed approach for practical implementation of efficient anomaly detection and classification method in the general real-life network environment.


Telecom IT ◽  
2019 ◽  
Vol 7 (3) ◽  
pp. 31-36
Author(s):  
A. Marochkina ◽  
А. Paramonov

The area of application for the Internet of Things networks is vast. One of the main uses for such a net-work is the organization of network traffic. A traffic stream can be considered as a self-organizing net-work with moving nodes. This article describes the various features of such networks. Models with vari-ous mobility, velocity and density parameters of nodes are considered for studying the routes in this networks.


2006 ◽  
Vol 13C (3) ◽  
pp. 283-294
Author(s):  
Koo-Hong Kang ◽  
Jin-Tae Oh ◽  
Jong-Soo Jang

Sign in / Sign up

Export Citation Format

Share Document