Our system is currently under heavy load due to increased usage. We're actively working on upgrades to improve performance. Thank you for your patience.
Proceedings of the 2007 Workshop on Large Scale Attack Defense 2007
DOI: 10.1145/1352664.1352675
|View full text |Cite
|
Sign up to set email alerts
|

Extracting hidden anomalies using sketch and non Gaussian multiresolution statistical detection procedures

Abstract: A new profile-based anomaly detection and characterization procedure is proposed. It aims at performing prompt and accurate detection of both short-lived and long-lasting low-intensity anomalies, without the recourse of any prior knowledge of the targetted traffic. Key features of the algorithm lie in the joint use of random projection techniques (sketches) and of a multiresolution non Gaussian marginal distribution modeling. The former enables both a reduction in the dimensionality of the data and the measure… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

2
128
0

Year Published

2010
2010
2015
2015

Publication Types

Select...
5
2
1

Relationship

4
4

Authors

Journals

citations
Cited by 98 publications
(130 citation statements)
references
References 22 publications
2
128
0
Order By: Relevance
“…Another technique that has been proposed for removing anomalies from Internet traffic data (or, rather, for negating their effect on evaluation results) is the following [176]. First, hash the data into a number of groups based on some select workload attribute, for example a flow's source IP address or destination port.…”
Section: Identifying Noise and Anomaliesmentioning
confidence: 99%
“…Another technique that has been proposed for removing anomalies from Internet traffic data (or, rather, for negating their effect on evaluation results) is the following [176]. First, hash the data into a number of groups based on some select workload attribute, for example a flow's source IP address or destination port.…”
Section: Identifying Noise and Anomaliesmentioning
confidence: 99%
“…of packets, bytes, or new flows) and/or particular traffic features (e.g., distribution of IP addresses and ports), using either single-link measurements or network-wide data. A non-exhaustive list of standard methods includes the use of signal processing techniques (e.g., ARIMA modeling, wavelets-based filtering) on single-link traffic measurements [1], Kalman filters [4] for network-wide anomaly detection, and Sketches applied to IP-flows [5,6].…”
Section: Related Work and Contributionsmentioning
confidence: 99%
“…The traces we shall work with consist of traffic from one of the trans-pacific links between Japan and the U.S.. MAWI traces are not labeled, but some previous work on anomaly detection has been done on them [6,15]. In particular, [15] detects network attacks using a signature-based approach, while [6] detects both attacks and anomalous flows using non-Gaussian modeling. We shall therefore refer to the combination of results obtained in both works as our ground truth for MAWI traffic.…”
Section: Experimental Evaluation Of Unadamentioning
confidence: 99%
“…-hash based (sketch) anomaly detectors [11,12] usually report only IP addresses and corresponding time bin, no other information (e.g. port number) describes identified anomalies.…”
Section: Granularity Of Eventsmentioning
confidence: 99%
“…One consists of random projection techniques (sketches) and multi-resolution gamma modeling [11]. Hereafter we call it as the gamma-based method.…”
Section: Data and Processingmentioning
confidence: 99%