Proceedings of the 9th ACM SIGCOMM Conference on Internet Measurement 2009
DOI: 10.1145/1644893.1644897
|View full text |Cite
|
Sign up to set email alerts
|

Anomaly extraction in backbone networks using association rules

Abstract: Anomaly extraction is an important problem essential to several applications ranging from root cause analysis, to attack mitigation, and testing anomaly detectors. Anomaly extraction is preceded by an anomaly detection step, which detects anomalous events and may identify a large set of possible associated event flows. The goal of anomaly extraction is to find and summarize the set of flows that are effectively caused by the anomalous event.In this work, we use meta-data provided by several histogram-based det… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
96
0
1

Year Published

2012
2012
2016
2016

Publication Types

Select...
8

Relationship

0
8

Authors

Journals

citations
Cited by 95 publications
(97 citation statements)
references
References 21 publications
0
96
0
1
Order By: Relevance
“…In several review papers [26][27][28][29][30][31][32] various network anomaly detection methods have been summarized. From aforementioned surveys one can find that the most effective methods of network anomaly detection are Principle Component Analysis [33][34][35], Wavelet analysis [36][37][38], Markovian models [39,40], Clustering [41][42][43], Histograms [44,45], Sketches [46,47], and Entropies [8,15,48].…”
Section: General Overview Of Network Anomaly Techniquesmentioning
confidence: 99%
See 1 more Smart Citation
“…In several review papers [26][27][28][29][30][31][32] various network anomaly detection methods have been summarized. From aforementioned surveys one can find that the most effective methods of network anomaly detection are Principle Component Analysis [33][34][35], Wavelet analysis [36][37][38], Markovian models [39,40], Clustering [41][42][43], Histograms [44,45], Sketches [46,47], and Entropies [8,15,48].…”
Section: General Overview Of Network Anomaly Techniquesmentioning
confidence: 99%
“…In their method histogram-based baselines were constructed from selected essential network traffic features distributions like addresses and ports. This work was augmented by Brauckhoff et al in [47] who applied association rule mining, in order to identify flows representing anomalous network traffic. The main problem with non-entropic feature distributions summarization techniques is a proper tuning [9].…”
Section: Detection Via Feature Distributionsmentioning
confidence: 99%
“…We evaluate our technique using the widely accepted 1998 DARPA [13] and 1999 KDD Cup [14] datasets. The logic behind using these datasets is that they have been used in a large proportion of research on network traffic analysis [15][16][17][18][19]. We also use the Kyoto dataset [32], which contains a present-day network traffic and attacks, to prove that our approach performs well not only with relatively old but also current network infrastructures.…”
Section: Motivationmentioning
confidence: 99%
“…The newly created ground truth of anomalies was manually validated and created independently of the tools. We used frequent itemset mining (FIM), a data mining technique that has been recently used in the literature to extract sets of anomalous flows [13,14]. We randomly selected sixteen 30-minute samples of NetFlow within dataset-1 and run FIM on them.…”
Section: Anomaly Overlap and False Negatives Analysismentioning
confidence: 99%
“…Given that NR does not provide volume information together with the reported anomalies, we used the raw NetFlow data saved for the subset of six days that we manually validated. In order to obtain the correct flows associated to each anomaly, we used the same method described in Section 3.4, a recent extension [14] of the Apriori algorithm [13] . Table 4 shows that the volumes associated to each sort of anomaly are significantly different.…”
Section: Magnitude Of the Anomaliesmentioning
confidence: 99%