• DocumentCode
    1379422
  • Title

    Histogram-based traffic anomaly detection

  • Author

    Kind, Andreas ; Stoecklin, Marc Ph ; Dimitropoulos, Xenofontas

  • Author_Institution
    BM Zurich Res. Lab., Zurich, Switzerland
  • Volume
    6
  • Issue
    2
  • fYear
    2009
  • fDate
    6/1/2009 12:00:00 AM
  • Firstpage
    110
  • Lastpage
    121
  • Abstract
    Identifying network anomalies is essential in enterprise and provider networks for diagnosing events, like attacks or failures, that severely impact performance, security, and Service Level Agreements (SLAs). Feature-based anomaly detection models (ab)normal network traffic behavior by analyzing different packet header features, like IP addresses and port numbers. In this work, we describe a new approach to feature-based anomaly detection that constructs histograms of different traffic features, models histogram patterns, and identifies deviations from the created models. We assess the strengths and weaknesses of many design options, like the utility of different features, the construction of feature histograms, the modeling and clustering algorithms, and the detection of deviations. Compared to previous feature-based anomaly detection approaches, our work differs by constructing detailed histogram models, rather than using coarse entropy-based distribution approximations. We evaluate histogram-based anomaly detection and compare it to previous approaches using collected network traffic traces. Our results demonstrate the effectiveness of our technique in identifying a wide range of anomalies. The assessed technical details are generic and, therefore, we expect that the derived insights will be useful for similar future research efforts.
  • Keywords
    computer network security; pattern clustering; probability; telecommunication traffic; clustering algorithm; coarse entropy; deviation detection; event diagnosis; feature based anomaly detection; feature histogram model; modeling algorithm; service level agreements; traffic anomaly detection; Algorithm design and analysis; Clustering algorithms; Computer vision; Event detection; Extraterrestrial measurements; Histograms; Intrusion detection; Monitoring; Telecommunication traffic; Traffic control; Computer network security, monitoring, clustering methods;
  • fLanguage
    English
  • Journal_Title
    Network and Service Management, IEEE Transactions on
  • Publisher
    ieee
  • ISSN
    1932-4537
  • Type

    jour

  • DOI
    10.1109/TNSM.2009.090604
  • Filename
    5374831