Network Anomaly Detection Based on Wavelet Analysis
نویسندگان
چکیده
Signal processing techniques have been applied recently for analyzing and detecting network anomalies due to their potential to find novel or unknown intrusions. In this paper, we propose a new network signal modelling technique for detecting network anomalies, combining the wavelet approximation and system identification theory. In order to characterize network traffic behaviors, we present fifteen features and use them as the input signals in our system. We then evaluate our approach with the 1999 DARPA intrusion detection dataset and conduct a comprehensive analysis of the intrusions in the dataset. Evaluation results show that the approach achieves high-detection rates in terms of both attack instances and attack types. Furthermore, we conduct a full day’s evaluation in a real large-scale WiFi ISP network where five attack types are successfully detected from over 30 millions flows.
منابع مشابه
Anomaly detection and localization by diffusion wavelet-based analysis on traffic matrix
Diffusion wavelets (DW) transform has been successfully used in Multi-Resolution Analysis (MRA) of traffic matrices because it inherently adapts to the structure of the underlying network. There are many potential applications based on DW analysis such as anomaly detection, routing optimization and capacity plan, which, however, have not been well developed. This paper shows how to apply two-di...
متن کاملA Hybrid Technique Using PCA and Wavelets in Network Traffic Anomaly Detection
Research into network anomaly detection has become crucial as a result of a significant increase in the number of computer attacks. Many approaches in network anomaly detection have been reported in the literature, but data or solutions typically are not freely available. Recently, a labeled network traffic flow dataset, Kyoto2006+, has been created and is publicly available. Most existing appr...
متن کاملDetecting Traffic Anomalies at the Source through aggregate analysis of packet header data
The frequent attacks on network infrastructure, using various forms of denial of service attacks, have led to an increased need for developing techniques for analyzing network traffic. If efficient analysis tools were available, it could become possible to detect the attacks, anomalies and to appropriately take action to contain the attacks before they have had time to propagate across the netw...
متن کاملSequential Anomaly Detection in Wireless Sensor Networks and Effects of Long Range Dependant Data
Abstract: Anomaly detection is important for the correct functioning of wireless sensor networks. Recent studies have shown that node mobility along with spatial correlation of the monitored phenomenon in sensor networks can lead to observation data that have long range dependency, which could significantly increase the difficulty of anomaly detection. In this paper, we develop an anomaly detec...
متن کاملSequential Anomaly Detection in Wireless Sensor Networks and Effects of Long-Range Dependent Data
Anomaly detection is important for the correct functioning of wireless sensor networks. Recent studies have shown that node mobility along with spatial correlation of the monitored phenomenon in sensor networks can lead to observation data that have long range dependency, which could significantly increase the difficulty of anomaly detection. In this article, we develop an anomaly detection sch...
متن کاملMulti Scale Time Series Prediction for Intrusion Detection
We propose an anomaly-based network intrusion detection system, which analyzes traffic features to detect anomalies. The proposed system can be used both in online as well as off-line mode for detecting deviations from the expected behavior. Although our approach uses network packet or flow data, it is general enough to be adaptable for use with any other network variable, which may be used as ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- EURASIP J. Adv. Sig. Proc.
دوره 2009 شماره
صفحات -
تاریخ انتشار 2009