2017 IEEE International Conference on Communications (ICC) 2017
DOI: 10.1109/icc.2017.7996569
|View full text |Cite
|
Sign up to set email alerts
|

Distributed, multi-level network anomaly detection for datacentre networks

Abstract: Over the past decade, numerous systems have been proposed to detect and subsequently prevent or mitigate security vulnerabilities. However, many existing intrusion or anomaly detection solutions are limited to a subset of the traffic due to scalability issues, hence failing to operate at line-rate on large, highspeed datacentre networks. In this paper, we present a two-level solution for anomaly detection leveraging independent execution and message passing semantics. We employ these constructs within a networ… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
17
0

Year Published

2018
2018
2023
2023

Publication Types

Select...
4
1

Relationship

1
4

Authors

Journals

citations
Cited by 6 publications
(17 citation statements)
references
References 14 publications
0
17
0
Order By: Relevance
“…The number of DDoS attacks are increasing due to the growing number of IoT devices with low security mechanisms and the fact that nowadays it is fairly easy to acquire attack tools. This has created a situation where large number of these devices can be used to perform distributed attacks, that is, to carry out more powerful attacks [1,2,5,7,12]. So far 24 different DDoS attack vectors have been found globally [12].…”
Section: Network Anomaly Detectionmentioning
confidence: 99%
See 3 more Smart Citations
“…The number of DDoS attacks are increasing due to the growing number of IoT devices with low security mechanisms and the fact that nowadays it is fairly easy to acquire attack tools. This has created a situation where large number of these devices can be used to perform distributed attacks, that is, to carry out more powerful attacks [1,2,5,7,12]. So far 24 different DDoS attack vectors have been found globally [12].…”
Section: Network Anomaly Detectionmentioning
confidence: 99%
“…Therefore, any changes in flow can be detected by comparing network data to stored metrics and used to detect presence of anomalies. [2] The authors tested the proposed method for various attack types, such as Brute Force access, 0-day attacks and Port Scans. Their test results concluded that the solution was able to offer complete path reconstruction at the onset of DDoS attacks that generally have high intensity.…”
Section: Network Anomaly Detectionmentioning
confidence: 99%
See 2 more Smart Citations
“…In these approaches, coarse-grained detection is to be executed upstream in the network, closer to the attackers. However, this leads to the use of dedicated middleboxes scattered across the network for scrubbing purposes [9] [6]. For an IoT-DDoS detection solution (i.e., protecting the network against DDoS originated on IoT devices) to solve the above mentioned problem, it has to ensure: a) lightweight processing, by relying on traffic features and analysis methods targeting overhead minimization and coarse-grained anomaly detection; b) platform-independence, to minimize the need for purpose-built devices and the use of traffic redirectionbased approaches; and c) high-performance, in order to achieve fast reaction through early detection while avoiding performance degradation.…”
Section: Introductionmentioning
confidence: 99%