Proceedings of the Joint International Conference on Measurement and Modeling of Computer Systems 2004
DOI: 10.1145/1005686.1005745
|View full text |Cite
|
Sign up to set email alerts
|

Combining routing and traffic data for detection of IP forwarding anomalies

Abstract: IP forwarding anomalies, triggered by equipment failures, implementation bugs, or configuration errors, can significantly disrupt and degrade network service. Robust and reliable detection of such anomalies is essential to rapid problem diagnosis, problem mitigation, and repair. We propose a simple, robust method that integrates routing and traffic data streams to reliably detect forwarding anomalies, and report on the evaluation of the method in a tier-1 ISP backbone. First, we transform each data stream sepa… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
5
0

Year Published

2006
2006
2013
2013

Publication Types

Select...
5
3

Relationship

0
8

Authors

Journals

citations
Cited by 32 publications
(5 citation statements)
references
References 6 publications
0
5
0
Order By: Relevance
“…Similar to our work, a number of measurement studies have correlated routing instability and end-to-end performance [15,23,6,16,19,1,25]. Labovitz et al studied BGP route instability, focusing on the stability of paths between Internet Service Providers and artificially injected routing failures to discover their effects on Internet path performance [15].…”
Section: Related Workmentioning
confidence: 77%
See 1 more Smart Citation
“…Similar to our work, a number of measurement studies have correlated routing instability and end-to-end performance [15,23,6,16,19,1,25]. Labovitz et al studied BGP route instability, focusing on the stability of paths between Internet Service Providers and artificially injected routing failures to discover their effects on Internet path performance [15].…”
Section: Related Workmentioning
confidence: 77%
“…Previous studies have shown that end-to-end performance on the Internet is unpredictable [20], and degraded end-toend path performance is correlated with routing dynamics [15,23,6,16,19,1]. Yet the causal relationship between routing changes and degraded data plane performance has not been established.…”
Section: Introductionmentioning
confidence: 99%
“…Most of the early anomaly detection methods [1,3,19,20] have treated anomalies as deviations in the overall traffic volume (number of bytes or packets). These volumebased anomaly detection methods have been successful in isolating large traffic changes (such as bandwidth DDOS), but fail to identify a large class of anomalies that do not cause detectable disruptions in traffic volume.…”
Section: Network Anomaly Detectionmentioning
confidence: 99%
“…Plenty of anomalybased solutions provide detection or mitigation of multiple types of attacks relying on complex analysis of the traffic features [3,11,15]. The challenge lies in defining a traffic analysis that is amenable for on-line processing (solutions based on mining tools as [11] are best suited to study rather than detect threats) but accurate enough to properly mitigate attacks (solutions that simply look at the overall traffic volume [1,10,14] provide no insights about what to discard during an attack).…”
Section: Prior Workmentioning
confidence: 99%