کد مقاله کد نشریه سال انتشار مقاله انگلیسی نسخه تمام متن
459070 696226 2016 11 صفحه PDF دانلود رایگان
عنوان انگلیسی مقاله ISI
Network anomaly detection using IP flows with Principal Component Analysis and Ant Colony Optimization
موضوعات مرتبط
مهندسی و علوم پایه مهندسی کامپیوتر شبکه های کامپیوتری و ارتباطات
پیش نمایش صفحه اول مقاله
Network anomaly detection using IP flows with Principal Component Analysis and Ant Colony Optimization
چکیده انگلیسی


• Anomaly detection issue is addressed based on network traffic profiling.
• Proposal and comparison of detection methods belonging to distinct algorithm classes.
• Detection mechanism constructed over an adaptation of a pattern matching technique.
• Use of real and simulated traffic to evaluate the proposed methods.
• Traffic patterns that may harm the network operations are proactively identified.

It is remarkable how proactive network management is in such demand nowadays, since networks are growing in size and complexity and Information Technology services cannot be stopped. In this manner, it is necessary to use an approach which proactively identifies traffic behavior patterns which may harm the network’s normal operations. Aiming an automated management to detect and prevent potential problems, we present and compare two novel anomaly detection mechanisms based on statistical procedure Principal Component Analysis and the Ant Colony Optimization metaheuristic. These methods generate a traffic profile, called Digital Signature of Network Segment using Flow analysis (DSNSF), which is adopted as normal network behavior. Then, this signature is compared with the real network traffic by using a modification of the Dynamic Time Warping metric in order to recognize anomalous events. Thus, a seven-dimensional analysis of IP flows is performed, allowing the characterization of bits, packets and flows traffic transmitted per second, and the extraction of descriptive flow attributes, like source IP address, destination IP address, source TCP/UDP port and destination TCP/UDP port. The systems were evaluated using a real network environment and showed promising results. Moreover, the correspondence between true-positive and false-positive rates demonstrates that the systems are able to enhance the detection of anomalous behavior by maintaining a satisfactory false-alarm rate.

Figure optionsDownload as PowerPoint slide

ناشر
Database: Elsevier - ScienceDirect (ساینس دایرکت)
Journal: Journal of Network and Computer Applications - Volume 64, April 2016, Pages 1–11
نویسندگان
, , , ,