2011
DOI: 10.1007/978-3-642-24712-5_18
|View full text |Cite
|
Sign up to set email alerts
|

On Detecting Abrupt Changes in Network Entropy Time Series

Abstract: Abstract. In recent years, much research focused on entropy as a metric describing the "chaos" inherent to network traffic. In particular, network entropy time series turned out to be a scalable technique to detect unexpected behavior in network traffic.In this paper, we propose an algorithm capable of detecting abrupt changes in network entropy time series. Abrupt changes indicate that the underlying frequency distribution of network traffic has changed significantly. Empirical evidence suggests that abrupt c… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
17
0

Year Published

2014
2014
2019
2019

Publication Types

Select...
4
3

Relationship

1
6

Authors

Journals

citations
Cited by 18 publications
(17 citation statements)
references
References 12 publications
0
17
0
Order By: Relevance
“…The significances of these two cases are different. Entropybased approaches for anomaly detection are appealing since they provide more fine-grained insights than traditional traffic volume analysis [31]. We are looking for abrupt changes, both the sharp increase and the sharp decline, in network entropy time series.…”
Section: Timeline Viewmentioning
confidence: 99%
“…The significances of these two cases are different. Entropybased approaches for anomaly detection are appealing since they provide more fine-grained insights than traditional traffic volume analysis [31]. We are looking for abrupt changes, both the sharp increase and the sharp decline, in network entropy time series.…”
Section: Timeline Viewmentioning
confidence: 99%
“…Network flows are summaries; they provide unidirectional or bidirectional meta information about network packets that share the same source and destination, IP address, ports, and IP protocol number [83,199]. Any activity on the network layer creates flows, including UDP and ICMP.…”
Section: Network Layermentioning
confidence: 99%
“…In [3], the authors proposed linear exponential smoothing to detect Flooding and Scanning DDoS attacks using bytes, flows, and packets per minutes. They report a 24hour training time and a window size of 5 minutes to accurately detect deviations in traffic.…”
Section: Related Studiesmentioning
confidence: 99%
“…TES also considers trend in data and seasonality. Although such assumptions and additional elements are useful in other applications, such as making stock market predictions, there is no need to adopt any of these techniques due to the network traffic being unaffected by any trend or seasonality as the authors in [3] claim. The formula of SES is shown in…”
Section: Forchaos Detection Algorithmmentioning
confidence: 99%