2012
DOI: 10.1002/dac.2432
|View full text |Cite
|
Sign up to set email alerts
|

Improving PCA‐based anomaly detection by using multiple time scale analysis and Kullback–Leibler divergence

Abstract: The increasing number of network attacks causes growing problems for network operators and users. Thus, detecting anomalous traffic is of primary interest in IP networks management. In this paper, we address the problem considering a method based on PCA for detecting network anomalies. In more detail, this paper presents a new technique that extends the state of the art in PCA-based anomaly detection. Indeed, by means of multi-scale analysis and Kullback-Leibler divergence, we are able to obtain great improvem… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
23
0

Year Published

2014
2014
2017
2017

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 29 publications
(23 citation statements)
references
References 15 publications
0
23
0
Order By: Relevance
“…As a criterion of the optimization of parameters, during ASR learning, we used statistical parameters (information measures) for the variants of solutions with two alternatives [18,25,26] for a modified entropic indicator, as well as the Kullback-Leibler divergence (for three hypotheses) [27]. Table 1 Stages of splitting FS into clusters…”
Section: The Aim and Tasks Of Researchmentioning
confidence: 99%
“…As a criterion of the optimization of parameters, during ASR learning, we used statistical parameters (information measures) for the variants of solutions with two alternatives [18,25,26] for a modified entropic indicator, as well as the Kullback-Leibler divergence (for three hypotheses) [27]. Table 1 Stages of splitting FS into clusters…”
Section: The Aim and Tasks Of Researchmentioning
confidence: 99%
“…For the problem under investigation, we resort to the simple statistics of x in order to avoid packet inspection and to guarantee quick feature building. The joint analysis of the anomalies at different timescales [14] or at different points of the system [15,16] sometimes helps improve performance. Anomaly-based detection may be more adaptive than ML as it simply looks at sudden changes of flows statistics [4,13], while providing good detection rates [12].…”
Section: Problem Formulationmentioning
confidence: 99%
“…An example is reported in the following performance evaluation. The joint analysis of the anomalies at different timescales [14] or at different points of the system [15,16] sometimes helps improve performance. In the presence of noisy measurements, the joint adoption of all the features in x may be crucial.…”
Section: Problem Formulationmentioning
confidence: 99%
“…In this phase, as major part of the initial traffic is removed, the volume of the data is reduced significantly, and so intrusion detection can be performed much easier and faster than before. Unlike many anomaly detection techniques described in the literature (e.g., [47][48][49], and [50]), extracting the TCP flow interarrival times, estimating their Weibull parameters, and evaluating their discrepancy with a Weibull distribution is not computationally intensive and can easily be carried out in real time.…”
Section: Resultsmentioning
confidence: 99%