메뉴 건너뛰기




Volumn 40, Issue 1, 2014, Pages 292-306

A transform domain-based anomaly detection approach to network-wide traffic

Author keywords

Anomaly detection; Feature extraction; Network wide traffic; Origin destination flows; Transform domain analysis

Indexed keywords

ELECTRIC NETWORK TOPOLOGY; FEATURE EXTRACTION;

EID: 84896316389     PISSN: 10848045     EISSN: 10958592     Source Type: Journal    
DOI: 10.1016/j.jnca.2013.09.014     Document Type: Article
Times cited : (126)

References (47)
  • 1
    • 79952623310 scopus 로고    scopus 로고
    • Periodicity-based anomalies in self-similar network traffic flow measurements
    • T. Akgül, S. Baykut, M.E. Kantarci, and S.F. Oktug Periodicity-based anomalies in self-similar network traffic flow measurements IEEE Trans Instrum Meas 60 4 2011 1358 1366
    • (2011) IEEE Trans Instrum Meas , vol.60 , Issue.4 , pp. 1358-1366
    • Akgül, T.1    Baykut, S.2    Kantarci, M.E.3    Oktug, S.F.4
  • 4
    • 77953294708 scopus 로고    scopus 로고
    • A signal processing view on packet sampling and anomaly detection
    • Brauckhoff D, Salamatian K, May M. A signal processing view on packet sampling and anomaly detection. In: Proceedings of INFOCOM; 2010. p. 1-9.
    • (2010) Proceedings of INFOCOM , pp. 1-9
    • Brauckhoff, D.1    Salamatian, K.2    May, M.3
  • 5
    • 77955428024 scopus 로고    scopus 로고
    • Optimal volume anomaly detection and isolation in large-scale IP networks using coarse-grained measurements
    • P. Casas, S. Vaton, L. Fillatre, and I. Nikiforov Optimal volume anomaly detection and isolation in large-scale IP networks using coarse-grained measurements Comput Netw 54 11 2010 1750 1766
    • (2010) Comput Netw , vol.54 , Issue.11 , pp. 1750-1766
    • Casas, P.1    Vaton, S.2    Fillatre, L.3    Nikiforov, I.4
  • 10
    • 78649408044 scopus 로고    scopus 로고
    • Dynamic feature analysis and measurement for large-scale network traffic monitoring
    • X. Guan, T. Qin, W. Li, and P. Wang Dynamic feature analysis and measurement for large-scale network traffic monitoring IEEE Trans Inf Forensics Secur 5 4 2010 905 919
    • (2010) IEEE Trans Inf Forensics Secur , vol.5 , Issue.4 , pp. 905-919
    • Guan, X.1    Qin, T.2    Li, W.3    Wang, P.4
  • 11
    • 34247507717 scopus 로고    scopus 로고
    • LSSP: A novel local segment-shared protection for multi-domain optical mesh networks
    • DOI 10.1016/j.comcom.2007.02.010, PII S0140366407000813
    • L. Guo LSSP: a novel local segment-shared protection for multi-domain optical mesh networks Comput Commun 30 8 2007 1794 1801 (Pubitemid 46659751)
    • (2007) Computer Communications , vol.30 , Issue.8 , pp. 1794-1801
    • Guo, L.1
  • 12
    • 33644997621 scopus 로고    scopus 로고
    • Path-based routing provisioning with mixed shared protection in WDM mesh networks
    • L. Guo, J. Cao, H Yu, and L Li Path-based routing provisioning with mixed shared protection in WDM mesh networks J Lightwave Technol 24 3 2006 1129 1141
    • (2006) J Lightwave Technol , vol.24 , Issue.3 , pp. 1129-1141
    • Guo, L.1    Cao, J.2    Yu, H.3    Li, L.4
  • 13
    • 36348978761 scopus 로고    scopus 로고
    • Diagnosing network disruptions with network-wide analysis
    • DOI 10.1145/1269899.1254890, SIGMETRICS'07 - Proceedings of the 2007 International Conference on Measurement and Modeling of Computer Systems
    • Huang Y, Feamster N, Lakhina A, Xu J. Diagnosing network disruptions with network-wide analysis. In: Proceedings of SIGMETRICS; 2007. p. 61-72. (Pubitemid 350158073)
    • (2007) Performance Evaluation Review , vol.35 , Issue.1 , pp. 61-72
    • Huang, Y.1    Feamster, N.2    Lakhina, A.3    Xu, J.4
  • 14
    • 59649105558 scopus 로고    scopus 로고
    • GARCH model-based large-scale IP traffic matrix estimation
    • D. Jiang, and G. Hu GARCH model-based large-scale IP traffic matrix estimation IEEE Commun Lett 13 1 2009 52 54
    • (2009) IEEE Commun Lett , vol.13 , Issue.1 , pp. 52-54
    • Jiang, D.1    Hu, G.2
  • 15
    • 77950302337 scopus 로고    scopus 로고
    • Mahalanobis distance-based traffic matrix estimation
    • D. Jiang, X. Wang, and L. Guo Mahalanobis distance-based traffic matrix estimation Eur Trans Telecommun 21 3 2010 195 201
    • (2010) Eur Trans Telecommun , vol.21 , Issue.3 , pp. 195-201
    • Jiang, D.1    Wang, X.2    Guo, L.3
  • 16
    • 80052453279 scopus 로고    scopus 로고
    • Joint time-frequency sparse estimation of large-scale network traffic
    • D. Jiang, Z. Xu, Z. Chen, Y. Han, and H. Xu Joint time-frequency sparse estimation of large-scale network traffic Comput Netw 55 10 2011 3533 3547
    • (2011) Comput Netw , vol.55 , Issue.10 , pp. 3533-3547
    • Jiang, D.1    Xu, Z.2    Chen, Z.3    Han, Y.4    Xu, H.5
  • 19
    • 45749141660 scopus 로고    scopus 로고
    • Statistical techniques for detecting traffic anomalies through packet header data
    • S.S. Kim, and A.L.N. Reddy Statistical techniques for detecting traffic anomalies through packet header data IEEE Trans Netw 16 3 2008 562 575
    • (2008) IEEE Trans Netw , vol.16 , Issue.3 , pp. 562-575
    • Kim, S.S.1    Reddy, A.L.N.2
  • 20
    • 67349121736 scopus 로고    scopus 로고
    • Oblivious routing of highly variable traffic in service overlays and IP backbones
    • M. Kodialam, T.V. Lakshman, J.B. Orlin, and S. Sengupta Oblivious routing of highly variable traffic in service overlays and IP backbones IEEE Trans Netw 17 2 2009 459 472
    • (2009) IEEE Trans Netw , vol.17 , Issue.2 , pp. 459-472
    • Kodialam, M.1    Lakshman, T.V.2    Orlin, J.B.3    Sengupta, S.4
  • 21
    • 33847290520 scopus 로고    scopus 로고
    • Mining anomalies using traffic feature distributions
    • DOI 10.1145/1090191.1080118
    • Lakhina A, Crovella M, Diot C. Mining anomalies using traffic feature distributions. In: Proceedings of SIGCOMM; 2005. p. 217-28. (Pubitemid 46323506)
    • (2005) Computer Communication Review , vol.35 , Issue.4 , pp. 217-228
    • Lakhina, A.1    Crovella, M.2    Diot, C.3
  • 22
    • 21844451952 scopus 로고    scopus 로고
    • Diagnosing network-wide traffic anomalies
    • DOI 10.1145/1030194.1015492, Computer Communication Review - Proceedings of ACM SIGCOMM 2004: Conference on Computer Communications
    • Lakhina A, Crovella M, Diot C. Diagnosing network-wide traffic anomalies. In: Proceedings of SIGCOMM; October 2004. p. 219-30. (Pubitemid 40954882)
    • (2004) Computer Communication Review , vol.34 , Issue.4 , pp. 219-230
    • Lakhina, A.1    Crovella, M.2    Diot, C.3
  • 23
    • 70350552089 scopus 로고    scopus 로고
    • Describing network traffic using the index of variability
    • G.Y. Lazarou, J. Baca, V.S. Frost, and J.B. Evans Describing network traffic using the index of variability IEEE Trans Netw 17 5 2009 1672 1683
    • (2009) IEEE Trans Netw , vol.17 , Issue.5 , pp. 1672-1683
    • Lazarou, G.Y.1    Baca, J.2    Frost, V.S.3    Evans, J.B.4
  • 24
    • 59949095579 scopus 로고    scopus 로고
    • Network anomaly detection based on wavelet analysis
    • W. Lu, and A. Ghorbani Network anomaly detection based on wavelet analysis EURASIP J Adv Signal Process 2009 1 16
    • (2009) EURASIP J Adv Signal Process , pp. 1-16
    • Lu, W.1    Ghorbani, A.2
  • 25
    • 66449085932 scopus 로고    scopus 로고
    • Reducing false positives in anomaly detectors through fuzzy alert aggregation
    • F. Maggi, M. Matteucci, and S. Zanero Reducing false positives in anomaly detectors through fuzzy alert aggregation Inf Fusion 10 4 2009 300 311
    • (2009) Inf Fusion , vol.10 , Issue.4 , pp. 300-311
    • Maggi, F.1    Matteucci, M.2    Zanero, S.3
  • 26
    • 77953880481 scopus 로고    scopus 로고
    • Unsupervised ensemble anomaly detection through time-periodical packet sampling
    • Nawata S, Uchida M, Gu Y, Tsuru M, Oie Y. Unsupervised ensemble anomaly detection through time-periodical packet sampling. In: Proceedings of INFOCOM; 2010. p. 1-9.
    • (2010) Proceedings of INFOCOM , pp. 1-9
    • Nawata, S.1    Uchida, M.2    Gu, Y.3    Tsuru, M.4    Oie, Y.5
  • 27
    • 84874727342 scopus 로고    scopus 로고
    • A power laws-based reconstruction approach to end-to-end network traffic
    • L. Nie, D. Jiang, and L. Guo A power laws-based reconstruction approach to end-to-end network traffic J Netw Comput Appl 36 2 2013 898 907
    • (2013) J Netw Comput Appl , vol.36 , Issue.2 , pp. 898-907
    • Nie, L.1    Jiang, D.2    Guo, L.3
  • 29
    • 67650149213 scopus 로고    scopus 로고
    • Spatio-temporal network anomaly detection by assessing deviations of empirical measures
    • I.C. Paschalidis, and G. Smaragdakis Spatio-temporal network anomaly detection by assessing deviations of empirical measures IEEE Trans Netw 17 3 2009 685 697
    • (2009) IEEE Trans Netw , vol.17 , Issue.3 , pp. 685-697
    • Paschalidis, I.C.1    Smaragdakis, G.2
  • 30
    • 79960922346 scopus 로고    scopus 로고
    • Monitoring abnormal network traffic based on blind source separation approach
    • T. Qin, X. Guan, W. Li, P. Wang, and Q. Huang Monitoring abnormal network traffic based on blind source separation approach J Netw Comput Appl 34 2011 1732 1742
    • (2011) J Netw Comput Appl , vol.34 , pp. 1732-1742
    • Qin, T.1    Guan, X.2    Li, W.3    Wang, P.4    Huang, Q.5
  • 33
    • 65249105995 scopus 로고    scopus 로고
    • Accurate anomaly detection through parallelism
    • S. Shanbhag, and T. Wolf Accurate anomaly detection through parallelism IEEE Netw 23 1 2009 22 28
    • (2009) IEEE Netw , vol.23 , Issue.1 , pp. 22-28
    • Shanbhag, S.1    Wolf, T.2
  • 34
    • 77953306333 scopus 로고    scopus 로고
    • Silveira F, Diot C. URCA: pulling out anomalies by their root causes. In: Proceedings of INFOCOM; 2010. p. 1-9.
    • Silveira F, Diot C. URCA: pulling out anomalies by their root causes. In: Proceedings of INFOCOM; 2010. p. 1-9.
  • 35
    • 57349120523 scopus 로고    scopus 로고
    • Optimal sampling in state space models with applications to network monitoring
    • Singhal H, Michailidis G. Optimal sampling in state space models with applications to network monitoring. In: Proceedings of SIGMETRICS; 2008. p. 145-56.
    • (2008) Proceedings of SIGMETRICS , pp. 145-156
    • Singhal, H.1    Michailidis, G.2
  • 36
    • 77955233769 scopus 로고    scopus 로고
    • ed. by A Wong (Fields Institute Communications, Providence) Pseudo-Differential Operators: PDEs and Time-Frequency Analysis
    • Stockwel RG, in Why use the S-transform, vol. 52, ed. by A Wong (Fields Institute Communications, Providence, 2007), p. 279-309. Pseudo-Differential Operators: PDEs and Time-Frequency Analysis
    • (2007) Why Use the S-transform , vol.52 , pp. 279-309
    • Stockwel, R.G.1
  • 37
    • 85028098285 scopus 로고    scopus 로고
    • Parametric methods for anomaly detection in aggregate traffic
    • G. Thatte, U. Mitra, and J. Heidemann Parametric methods for anomaly detection in aggregate traffic IEEE/ACM Trans Netw 19 2 2011 512 525
    • (2011) IEEE/ACM Trans Netw , vol.19 , Issue.2 , pp. 512-525
    • Thatte, G.1    Mitra, U.2    Heidemann, J.3
  • 39
    • 80051794572 scopus 로고    scopus 로고
    • Anomalous loss performance for mixed real-time and TCP traffic in routers with very small buffers
    • A. Vishwanath, V. Sivaraman, and G.N. Rouskas Anomalous loss performance for mixed real-time and TCP traffic in routers with very small buffers IEEE/ACM Trans Netw 19 4 2011 933 946
    • (2011) IEEE/ACM Trans Netw , vol.19 , Issue.4 , pp. 933-946
    • Vishwanath, A.1    Sivaraman, V.2    Rouskas, G.N.3
  • 40
    • 67650145176 scopus 로고    scopus 로고
    • Swing: Realistic and responsive network traffic generation
    • K.V. Vishwanath, and A. Vahdat Swing: realistic and responsive network traffic generation IEEE Trans Netw 17 3 2009 712 725
    • (2009) IEEE Trans Netw , vol.17 , Issue.3 , pp. 712-725
    • Vishwanath, K.V.1    Vahdat, A.2
  • 41
    • 70350493344 scopus 로고    scopus 로고
    • Decomposable principal component analysis
    • A. Wiese, and A.O. Hero Decomposable principal component analysis IEEE Trans Signal Process 57 11 2009 4369 4377
    • (2009) IEEE Trans Signal Process , vol.57 , Issue.11 , pp. 4369-4377
    • Wiese, A.1    Hero, A.O.2
  • 42
    • 79957530146 scopus 로고    scopus 로고
    • Low-rate DDoS attacks detection and traceback by using new information metrics
    • Y. Xiang, K. Li, and W. Zhou Low-rate DDoS attacks detection and traceback by using new information metrics IEEE Trans Inf Forensics Secur 6 2 2011 426 437
    • (2011) IEEE Trans Inf Forensics Secur , vol.6 , Issue.2 , pp. 426-437
    • Xiang, Y.1    Li, K.2    Zhou, W.3
  • 43
    • 33750711125 scopus 로고    scopus 로고
    • Profiling internet backbone traffic: Behavior models and applications
    • DOI 10.1145/1090191.1080112
    • Xu K, Zhang Z, Bhattacharyya S. Profiling Internet backbone traffic: behavior models and applications. In: Proceedings of SIGCOMM; 2005. p. 169-80. (Pubitemid 46323502)
    • (2005) Computer Communication Review , vol.35 , Issue.4 , pp. 169-180
    • Xu, K.1    Zhang, Z.-L.2    Bhattacharyya, S.3
  • 44
    • 85008008496 scopus 로고    scopus 로고
    • Internet traffic behavior profiling for network security monitoring
    • K. Xu, Z. Zhang, and S. Bhattacharyya Internet traffic behavior profiling for network security monitoring IEEE Trans Netw 16 6 2008 1241 1252
    • (2008) IEEE Trans Netw , vol.16 , Issue.6 , pp. 1241-1252
    • Xu, K.1    Zhang, Z.2    Bhattacharyya, S.3
  • 45
    • 77956179239 scopus 로고    scopus 로고
    • Self-disciplinary worms and countermeasures: Modeling and analysis
    • W. Yu, N. Zhang, X. Fu, and Wei Zhao Self-disciplinary worms and countermeasures: modeling and analysis IEEE Trans Parallel Distrib Systems 21 10 2010 1501 1514
    • (2010) IEEE Trans Parallel Distrib Systems , vol.21 , Issue.10 , pp. 1501-1514
    • Yu, W.1    Zhang, N.2    Fu, X.3    Zhao, W.4
  • 46
    • 50949098790 scopus 로고    scopus 로고
    • A secure quality of service routing protocol for wireless Ad Hoc networks
    • Zhu T, Yu M. A secure quality of service routing protocol for wireless Ad Hoc networks. In: Proceedings of GLOBECOM'06; 2006. p. 1-6.
    • (2006) Proceedings of GLOBECOM'06 , pp. 1-6
    • Zhu, T.1    Yu, M.2
  • 47
    • 84855828842 scopus 로고    scopus 로고
    • A secure energy routing mechanism for sharing renewable energy in smart microgrid
    • Zhu T, Xiao S, Yi P, Towsley D, Gong W. A secure energy routing mechanism for sharing renewable energy in smart microgrid. In: Proceedings of SmartGridComm'11; 2011. p. 143-8.
    • (2011) Proceedings of SmartGridComm'11 , pp. 143-148
    • Zhu, T.1    Xiao, S.2    Yi, P.3    Towsley, D.4    Gong, W.5


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.