Title :
A taxonomy of anomalies in backbone network traffic
Author :
Mazel, Johan ; Fontugne, Romain ; Fukuda, Kenji
Author_Institution :
JFLI, NII, Tokyo, Japan
Abstract :
The potential threat of network anomalies on Internet has led to a constant effort by the research community to design reliable detection methods. Detection is not enough, however, because network administrators need additional information on the nature of events occurring in a network. Several works try to classify detected events or establish a taxonomy of known events. But, these works are non-overlapping in terms of anomaly type coverage. On the one hand, existing classification methods use a limited set of labels. On the other hand, taxonomies often target a single type of anomaly or, when they have wider scope, fail to present the full spectrum of what really happens in the wild. We thus present a new taxonomy of network anomalies with wide coverage of existing work. We also provide a set of signatures that assign taxonomy labels to events. We present a preliminary study applying this taxonomy with six years of real network traffic from the MAWI repository. We classify previously documented anomalous events and draw to main conclusions. First, the taxonomy-based analysis provides new insights regarding events previous classified by heuristic rule labeling. For example, some RST events are now classified as network scan response and the majority of ICMP events are split into network scans and network scan responses. Moreover, some previously unknown events now account for a substantial number of all UDP network scans, network scan responses and port scans. Second, the number of unknown events decreases from 20 to 10% of all events with the proposed taxonomy as compared to the heuristic approach.
Keywords :
Internet; computer network security; multi-access systems; multiuser detection; telecommunication traffic; transport protocols; ICMP events; Internet; MAWI repository; RST events; UDP network scans; backbone network traffic; classification methods; detection methods; heuristic rule labeling; network administrators; network anomalies; network scan response; port scans; taxonomy labels; taxonomy-based analysis; Computer crime; Context; Entropy; Labeling; Ports (Computers); Protocols; Taxonomy;
Conference_Titel :
Wireless Communications and Mobile Computing Conference (IWCMC), 2014 International
Conference_Location :
Nicosia
Print_ISBN :
978-1-4799-7324-8
DOI :
10.1109/IWCMC.2014.6906328