• DocumentCode
    1662507
  • Title

    Port-based traffic verification as a paradigm for anomaly detection

  • Author

    Panchamukhi, Vadiraj ; Murthy, Hema A.

  • Author_Institution
    Dept. of Comput. Sci. & Eng., Indian Inst. of Technol. Madras, Chennai, India
  • fYear
    2012
  • Firstpage
    1
  • Lastpage
    5
  • Abstract
    An anomaly is an activity that deviates from the wellknown behaviour of the system. Anomaly detection in networks is of interest from two perspectives: an organization´s perspective and an Internet Service Provider´s (ISP) perspective. Protection of its computer network infrastructure is an important task for all organizations. Organizations desire that their networks are robust and resilient to any kind of attack. Anomaly detection forms an important part of this network resiliency. Also the ISPs want to maximize the utilization of their resources. Hence an ISP would be interested to know any resource failure immediately so as to correct the problem. ISPs would also be interested in safeguarding their network from malicious activities. We describe here a Gaussian Mixture Model (GMM)-based traffic verification system as a paradigm for network anomaly detection. The traffic characteristics aggregated over a period of time is given to the model to verify the validity of the traffic. If the traffic does not obey the model then we raise an alarm flagging it as an anomaly. Our results show that the system performs with less than 1% misses and false alarms.
  • Keywords
    Gaussian processes; Internet; computer network security; GMM-based traffic verification system; Gaussian mixture model; ISP perspective; Internet Service Provider; computer network infrastructure protection; network anomaly detection; network resiliency; organization perspective; port-based traffic verification; resource failure; traffic characteristics; Adaptation models; Computational modeling; Data models; Electronic mail; Hidden Markov models; Training; Vectors; Anomaly detection; Gaussian Mixture Model; Intrusion detection; Network Traffic Modeling; Network security;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Communications (NCC), 2012 National Conference on
  • Conference_Location
    Kharagpur
  • Print_ISBN
    978-1-4673-0815-1
  • Type

    conf

  • DOI
    10.1109/NCC.2012.6176909
  • Filename
    6176909