2017 14th IEEE Annual Consumer Communications &Amp; Networking Conference (CCNC) 2017
DOI: 10.1109/ccnc.2017.7983209
|View full text |Cite
|
Sign up to set email alerts
|

Distributed network anomaly detection on an event processing framework

Abstract: Abstract-Network Intrusion Detection Systems (NIDS) are an integral part of modern data centres to ensure high availability and compliance with Service Level Agreements (SLAs). Currently, NIDS are deployed on high-performance, high-cost middleboxes that are responsible for monitoring a limited section of the network. The fast increasing size and aggregate throughput of modern data centre networks have come to challenge the current approach to anomaly detection to satisfy the fast growing compute demand.In this… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
9
0

Year Published

2018
2018
2019
2019

Publication Types

Select...
3
1
1

Relationship

1
4

Authors

Journals

citations
Cited by 5 publications
(9 citation statements)
references
References 17 publications
0
9
0
Order By: Relevance
“…Distributed NIDS aims to reduce cost and also increase detection performance in these complex high speed networks that provides a large and varying numbers of services, such as cloud servers, data instances, data storage, image and facial recognition services. [4] Their proposed system architecture relies on topology of Apache Storm, Directed Acyclic Graph(DAG), which is used for distribution functionality. Apache Storm functionality is mapped directly to data center network topology.…”
Section: Network Anomaly Detectionmentioning
confidence: 99%
See 4 more Smart Citations
“…Distributed NIDS aims to reduce cost and also increase detection performance in these complex high speed networks that provides a large and varying numbers of services, such as cloud servers, data instances, data storage, image and facial recognition services. [4] Their proposed system architecture relies on topology of Apache Storm, Directed Acyclic Graph(DAG), which is used for distribution functionality. Apache Storm functionality is mapped directly to data center network topology.…”
Section: Network Anomaly Detectionmentioning
confidence: 99%
“…For bidirectional detection in a network, two identical topologies are needed due to one direction restriction in a Storm and DAG. [4] The authors proposed a lightweight Storm module directly integrated to fabric switch to facilitate network implementation. Their system detection modules are responsible for extracting data from packets and perform detection independently.…”
Section: Network Anomaly Detectionmentioning
confidence: 99%
See 3 more Smart Citations