DocumentCode :
1460342
Title :
Anomaly Extraction in Backbone Networks Using Association Rules
Author :
Brauckhoff, Daniela ; Dimitropoulos, Xenofontas ; Wagner, Aaron ; Salamatian, Kave
Author_Institution :
Computing Department, ETH Zurich, Zurich, Switzerland
Volume :
20
Issue :
6
fYear :
2012
Firstpage :
1788
Lastpage :
1799
Abstract :
Anomaly extraction refers to automatically finding, in a large set of flows observed during an anomalous time interval, the flows associated with the anomalous event(s). It is important for root-cause analysis, network forensics, attack mitigation, and anomaly modeling. In this paper, we use meta-data provided by several histogram-based detectors to identify suspicious flows, and then apply association rule mining to find and summarize anomalous flows. Using rich traffic data from a backbone network, we show that our technique effectively finds the flows associated with the anomalous event(s) in all studied cases. In addition, it triggers a very small number of false positives, on average between 2 and 8.5, which exhibit specific patterns and can be trivially sorted out by an administrator. Our anomaly extraction method significantly reduces the work-hours needed for analyzing alarms, making anomaly detection systems more practical.
Keywords :
Association rules; Cloning; Detectors; Feature extraction; Histograms; IP networks; Association rules; computer networks; data mining; detection algorithms;
fLanguage :
English
Journal_Title :
Networking, IEEE/ACM Transactions on
Publisher :
ieee
ISSN :
1063-6692
Type :
jour
DOI :
10.1109/TNET.2012.2187306
Filename :
6161622
Link To Document :
بازگشت