2020
DOI: 10.1007/s10994-020-05870-y
|View full text |Cite
|
Sign up to set email alerts
|

Detecting anomalous packets in network transfers: investigations using PCA, autoencoder and isolation forest in TCP

Abstract: Large-scale scientific workflows rely heavily on high-performance file transfers. These transfers require strict quality parameters such as guaranteed bandwidth, no packet loss or data duplication. To have successful file transfers, methods such as predetermined thresholds and statistical analysis need to be done to determine abnormal patterns. Network administrators routinely monitor and analyze network data for diagnosing and alleviating these, making decisions based on their experience. However, as networks… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
5
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
6
2

Relationship

1
7

Authors

Journals

citations
Cited by 10 publications
(5 citation statements)
references
References 34 publications
(34 reference statements)
0
5
0
Order By: Relevance
“…2009), network anomaly (Kiran et al . 2020), and others. PCA algorithm has been modified to deal with robustness issue as well (refer to Tarr, Müller & Weber 2016 and related references).…”
Section: Introductionmentioning
confidence: 93%
See 1 more Smart Citation
“…2009), network anomaly (Kiran et al . 2020), and others. PCA algorithm has been modified to deal with robustness issue as well (refer to Tarr, Müller & Weber 2016 and related references).…”
Section: Introductionmentioning
confidence: 93%
“…These PCs are then arranged in order of decreasing importance based on their variability and only those which contribute significantly to the representation of the dataset are retained. The PCA technique has found applications in areas such as script recognition (Naser et al 2010), missing data (Cardot & Degras 2018), face recognition (Dryden et al 2009), network anomaly (Kiran et al 2020), and others. PCA algorithm has been modified to deal with robustness issue as well (refer to Tarr, Muller & Weber 2016 and related references).…”
Section: Introductionmentioning
confidence: 99%
“…Several wide-range anomaly detection techniques that are often used in network IDSs are listed as follows: Statistical Profiling with Histograms [3], [4], Parametric and Non-parametric Statistical Modeling [5], [6], (Deep or Shallow) Artificial Neural Networks and Autoencoders [7]- [10], (One-Class) Support Vector Machines [11], [12], Reconstruction methods [13]- [15], Clustering methods [16], [17]. However, generally most of these learning systems detect abnormal data flows or packets based on their features and characteristics.…”
Section: A Related Workmentioning
confidence: 99%
“…We choose to use CART for its explainability and efficiency, as discussed in [20,59,34]. RF was used in the previous study for this same problem for its advantages of performance [60]. However, we will show later in this paper that RF without optimization is not enough.…”
Section: B Data Minersmentioning
confidence: 99%