Statistical Sketch based Anomaly Detection and Validation using an Anomaly Database

نویسندگان

  • Guillaume Dewaele
  • Pierre Borgnat
  • Patrice Abry
  • Julien Aussibal
  • Laurent Gallon
  • P. Owezarski
  • D. Veitch
چکیده

An anomaly detection procedure based on statistical profiles of sketches of internet traffic is proposed. To validate its statistical performance, measurement campaigns were conducted to collect regular traffic as well as traffic with anomalies, on the Renater network. Anomalies were produced using real-world DDoS tools (tfn2k, trin00). The attacks target different services (ICMP, SYN, UDP, etc.) and aim at occupying the bandwidth. They consists of volume anomalies, however kept at low intensity levels with no noticeable impact on the global traffic. This leads to the production of a documented, controlled and reproducible anomaly database. The traffic traces are analyzed by means of random projections in a small-dimension space (sketches). Each sketch is aggregated over a collection of different time-scales and modeled using non-Gaussian statistics. Anomalies are detected by quantifying the departures of the modeling parameters from those estimated under normal situations. Such deviations are quantified by means of Mean Quadratic Distance or of Kullback-Leibler divergences. The labeled database enables us to study the statistical performance (false negative vs. false positive) of the proposed detection procedures. They are shown to present satisfactory performance, down to alert times of the order of 1 minute.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Detection of Mo geochemical anomaly in depth using a new scenario based on spectrum–area fractal analysis

Detection of deep and hidden mineralization using the surface geochemical data is a challenging subject in the mineral exploration. In this work, a novel scenario based on the spectrum–area fractal analysis (SAFA) and the principal component analysis (PCA) has been applied to distinguish and delineate the blind and deep Mo anomaly in the Dalli Cu–Au porphyry mineralization area. The Dalli miner...

متن کامل

Separation Between Anomalous Targets and Background Based on the Decomposition of Reduced Dimension Hyperspectral Image

The application of anomaly detection has been given a special place among the different   processings of hyperspectral images. Nowadays, many of the methods only use background information to detect between anomaly pixels and background. Due to noise and the presence of anomaly pixels in the background, the assumption of the specific statistical distribution of the background, as well as the co...

متن کامل

ADMIRE: Anomaly detection method using entropy-based PCA with three-step sketches

Network anomaly detection using dimensionality reduction has recently been well studied in order to overcome the weakness of signature-based detection. Previous works have proposed a method for detecting particular anomalous IP-flows by using random projection (sketch) and a Principal Component Analysis (PCA). It yields promising high detection capability results without needing a pre-defined a...

متن کامل

Moving dispersion method for statistical anomaly detection in intrusion detection systems

A unified method for statistical anomaly detection in intrusion detection systems is theoretically introduced. It is based on estimating a dispersion measure of numerical or symbolic data on successive moving windows in time and finding the times when a relative change of the dispersion measure is significant. Appropriate dispersion measures, relative differences, moving windows, as well as tec...

متن کامل

A hybrid approach for database intrusion detection at transaction and inter-transaction levels

Nowadays, information plays an important role in organizations. Sensitive information is often stored in databases. Traditional mechanisms such as encryption, access control, and authentication cannot provide a high level of confidence. Therefore, the existence of Intrusion Detection Systems in databases is necessary. In this paper, we propose an intrusion detection system for detecting attacks...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2006