Proceedings of the 4th Asian Conference on Internet Engineering 2008
DOI: 10.1145/1503370.1503377
|View full text |Cite
|
Sign up to set email alerts
|

An image processing approach to traffic anomaly detection

Abstract: This paper discusses the possibility of applying an imageprocessing technique to detecting anomalies in Internet traffic, which is different from traditional techniques of detecting anomalies. We first demonstrate that anomalous packet behavior in darknet traces often has a characteristic multiscale structure in time and space (e.g., in addresses or ports). These observed structures consist of abnormal and non random uses of particular traffic features. From the observations, we propose a new type of algorithm… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
23
0

Year Published

2009
2009
2023
2023

Publication Types

Select...
4
3

Relationship

2
5

Authors

Journals

citations
Cited by 18 publications
(23 citation statements)
references
References 16 publications
0
23
0
Order By: Relevance
“…Dashed lines represent the separation in community structure [1]. The green and red circles are alarms reported by a method based on image processing [4], their labels are rough as they stand only for the prominent IP addresses of traffic reported. However, labels within blue circles are the exact IP addresses reported by another method based on gamma modeling [3].…”
Section: Resultsmentioning
confidence: 99%
See 2 more Smart Citations
“…Dashed lines represent the separation in community structure [1]. The green and red circles are alarms reported by a method based on image processing [4], their labels are rough as they stand only for the prominent IP addresses of traffic reported. However, labels within blue circles are the exact IP addresses reported by another method based on gamma modeling [3].…”
Section: Resultsmentioning
confidence: 99%
“…port number) describe identified anomalies. (2) In previous work [4] we developed an anomaly detector based on image processing that reports events as a set of IP addresses, port numbers and timestamps corresponding to a group of packets identified in analyzed pictures. (3) Several intrusion detection systems take advantage of clustering techniques to identify anomalous traffic [7].…”
Section: Difficultiesmentioning
confidence: 99%
See 1 more Smart Citation
“…In [9], Lakhina et al use entropy as a summarization tool, and implement automatic classification of anomalies via unsupervised learning. [6] represents multiple pieces of measurements as different colors of an image, enabling uniform processing of multidimensional packet header data. However, they only consider the number of packets for different values of the header field of a packet, e.g., source address, destination address, source port, destination port, etc.…”
Section: Related Workmentioning
confidence: 99%
“…In our experiment, we employ the adaptive threshold defined in Eqn. (6). and set η = 0.1 by default.…”
Section: ) Estimation Of δ and φmentioning
confidence: 99%