Towards Systematically Evaluating Flow-level Anomaly Detection Mechanisms

نویسندگان

  • Daniela Brauckhoff
  • Ulrich Fiedler
  • Bernhard Plattner
چکیده

Currently, flow-level anomaly detection systems get widely deployed in ISP networks to provide fast detection in case of large-scale anomalies such as worms, denial-of-service attacks, or flash crowds. Unfortunately, benchmark evaluation traces which would allow for systematically evaluating these anomaly detection systems are not available to neither research nor industry. In this paper, we identify three major problems that hinder a systematic evaluation of flow-level anomaly detection systems. (1) Only very few backbone traffic traces are available to the research community due to privacy concerns of ISPs and their customers. (2) Available traces do not contain anomalies of varying intensities which are required for assessing the sensitivity of anomaly detection systems. And (3) available traces do not contain annotated anomalies, also referred to as ground truth. We discuss existing approaches that aim at overcoming these three problems, and identify their drawbacks. We propose an alternative approach for generating benchmark evaluation traces, namely synthetic generation of flow-level traffic traces, and discuss why and how this approach can provide a solution to the identified problems. The two main challenges with such an approach are to define normal and anomalous network behavior, and to find realistic models describing normal and anomalous traffic at the flow level. We discuss our ideas for defining normal and anomalous traffic, and specify the framework for a novel flow traffic model targeted at anomaly detection. Finally, we provide an initial design for a synthetic flow trace generator.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

FLAME: A Flow-Level Anomaly Modeling Engine

There are several remaining open questions in the area of flow-based anomaly detection, e.g., how to do meaningful evaluations of anomaly detection mechanisms; how to get conclusive information about the origin and nature of an anomaly; or how to detect low intensity attacks. In order to answer these questions, network traffic traces that are representative for a specific test environment, and ...

متن کامل

Wheeler-DeWitt Equation in AdS/CFT Correspondence

We discuss a quantum extension of the holographic RG flow equation obtained previously from the classical Hamiltonian constraint in the bulk AdS supergravity. The WheelerDeWitt equation is proposed to generate the extended RG flow and to produce 1/N subleading corrections systematically. Our formulation in five dimensions is applied to the derivation of the Weyl anomaly of boundary N = 4 SU(N) ...

متن کامل

Flow-level Anomaly Detection: Blessing or Curse?

Is flow-level anomaly detection a blessing due to excellent detection rates or is it a curse due to high false positive rates? To this end, we cannot answer this question for mainly two reasons: First, we still do not understand the flow-level characteristics and frequency of benign and malicious anomalies in full detail. And second, we have no means for assessing the power, in terms of false p...

متن کامل

A hybrid approach for database intrusion detection at transaction and inter-transaction levels

Nowadays, information plays an important role in organizations. Sensitive information is often stored in databases. Traditional mechanisms such as encryption, access control, and authentication cannot provide a high level of confidence. Therefore, the existence of Intrusion Detection Systems in databases is necessary. In this paper, we propose an intrusion detection system for detecting attacks...

متن کامل

Detecting Illegal System Calls Using a Data-Oriented Detection Model

The most common anomaly detection mechanisms at application level consist in detecting a deviation of the control-flow of a program. A popular method to detect such anomaly is the use of application sequences of system calls. However, such methods do not detect mimicry attacks or attacks against the integrity of the system call parameters. To enhance such detection mechanisms, we propose an app...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2006