메뉴 건너뛰기




Volumn 73, Issue , 2014, Pages 224-243

Traffic anomaly diagnosis in Internet backbone networks: A survey

Author keywords

Anomaly detection; Digital signal processing; Feature selection; Information theory; Internet traffic anomalies; Statistical methods

Indexed keywords

DIGITAL SIGNAL PROCESSING; FEATURE EXTRACTION; INFORMATION THEORY; STATISTICAL METHODS; SURVEYS;

EID: 84907567316     PISSN: 13891286     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.comnet.2014.08.007     Document Type: Short Survey
Times cited : (48)

References (104)
  • 3
    • 80052448813 scopus 로고    scopus 로고
    • Accurate network anomaly classification with generalized entropy metrics
    • B. Tellenbach, M. Burkhart, D. Schatzmann, D. Gugelmann, and D. Sornette Accurate network anomaly classification with generalized entropy metrics Comput. Netw. 55 15 2011 3485 3502 10.1016/j.comnet.2011.07.008
    • (2011) Comput. Netw. , vol.55 , Issue.15 , pp. 3485-3502
    • Tellenbach, B.1    Burkhart, M.2    Schatzmann, D.3    Gugelmann, D.4    Sornette, D.5
  • 4
    • 84887047298 scopus 로고    scopus 로고
    • Distribution-based anomaly detection via generalized likelihood ratio test: A general maximum entropy approach
    • A. Coluccia, A. D'alconzo, and F. Ricciato Distribution-based anomaly detection via generalized likelihood ratio test: a general maximum entropy approach Comput. Netw. 57 17 2013 3446 3462 http://dx.doi.org/10.1016/j.comnet.2013.07.028
    • (2013) Comput. Netw. , vol.57 , Issue.17 , pp. 3446-3462
    • Coluccia, A.1    D'Alconzo, A.2    Ricciato, F.3
  • 5
    • 84655161362 scopus 로고    scopus 로고
    • Collaborative anomaly-based detection of large-scale internet attacks
    • T. Gamer Collaborative anomaly-based detection of large-scale internet attacks Comput. Netw. 56 1 2012 169 185 10.1016/j.comnet.2011.08.015
    • (2012) Comput. Netw. , vol.56 , Issue.1 , pp. 169-185
    • Gamer, T.1
  • 6
    • 84903531892 scopus 로고    scopus 로고
    • Anomaly extraction in backbone networks using association rules
    • D. Brauckhoff, X. Dimitropoulos, A. Wagner, and K. Salamatian Anomaly extraction in backbone networks using association rules IEEE/ACM Trans. Network. 20 6 2012 1788 1799 10.1109/TNET.2012.2187306
    • (2012) IEEE/ACM Trans. Network. , vol.20 , Issue.6 , pp. 1788-1799
    • Brauckhoff, D.1    Dimitropoulos, X.2    Wagner, A.3    Salamatian, K.4
  • 7
    • 34250315640 scopus 로고    scopus 로고
    • An overview of anomaly detection techniques: Existing solutions and latest technological trends
    • A. Patcha, and J.-M. Park An overview of anomaly detection techniques: existing solutions and latest technological trends Comput. Netw. 51 12 2007 3448 3470 10.1016/j.comnet.2007.02.001
    • (2007) Comput. Netw. , vol.51 , Issue.12 , pp. 3448-3470
    • Patcha, A.1    Park, J.-M.2
  • 9
    • 4344659702 scopus 로고    scopus 로고
    • Anomaly detection methods in wired networks: A survey and taxonomy
    • J.M. Estvez-Tapiador, P. Garcia-Teodoro, and J.E. Daz-Verdejo Anomaly detection methods in wired networks: a survey and taxonomy Comput. Commun. 27 16 2004 1569 1584
    • (2004) Comput. Commun. , vol.27 , Issue.16 , pp. 1569-1584
    • Estvez-Tapiador, J.M.1    Garcia-Teodoro, P.2    Daz-Verdejo, J.E.3
  • 10
    • 70349659426 scopus 로고    scopus 로고
    • Network performance anomaly detection and localization
    • IEEE
    • P. Barford, N. Duffield, A. Ron, and J. Sommers Network performance anomaly detection and localization INFOCOM 2009 2009 IEEE 1377 1385 http://dx.doi.org/10.1109/INFCOM.2009.5062053
    • (2009) INFOCOM 2009 , pp. 1377-1385
    • Barford, P.1    Duffield, N.2    Ron, A.3    Sommers, J.4
  • 11
    • 84861584915 scopus 로고    scopus 로고
    • Traffic anomaly detection based on the ip size distribution
    • F. Soldo, A. Metwally, Traffic anomaly detection based on the ip size distribution, in: INFOCOM, 2012 Proceedings IEEE, 2012, pp. 2005-2013. http://dx.doi.org/10.1109/INFCOM.2012.6195581.
    • (2012) INFOCOM, 2012 Proceedings IEEE , pp. 2005-2013
    • Soldo, F.1    Metwally, A.2
  • 12
    • 67650149213 scopus 로고    scopus 로고
    • Spatio-temporal network anomaly detection by assessing deviations of empirical measures
    • I.C. Paschalidis, and G. Smaragdakis Spatio-temporal network anomaly detection by assessing deviations of empirical measures IEEE/ACM Trans. Netw. 17 3 2009 685 697 10.1109/TNET.2008.2001468
    • (2009) IEEE/ACM Trans. Netw. , vol.17 , Issue.3 , pp. 685-697
    • Paschalidis, I.C.1    Smaragdakis, G.2
  • 15
    • 84907497169 scopus 로고    scopus 로고
    • Snort
    • Snort < http://www.snort.org >.
  • 16
    • 84907497168 scopus 로고    scopus 로고
    • Bro ids
    • Bro ids < http://www.bro.org >.
  • 17
    • 0033295259 scopus 로고    scopus 로고
    • Bro: A system for detecting network intruders in real-time
    • V. Paxson, Bro: a system for detecting network intruders in real-time, in: Computer Networks, 1999, pp. 2435-2463.
    • (1999) Computer Networks , pp. 2435-2463
    • Paxson, V.1
  • 18
    • 0034226287 scopus 로고    scopus 로고
    • A revised taxonomy for intrusion-detection systems
    • H. Debar, M. Dacier, and A. Wespi A revised taxonomy for intrusion-detection systems Ann. Télécommun. 55 7-8 2000 361 378
    • (2000) Ann. Télécommun. , vol.55 , Issue.78 , pp. 361-378
    • Debar, H.1    Dacier, M.2    Wespi, A.3
  • 19
    • 34147099073 scopus 로고    scopus 로고
    • Survey of network-based defense mechanisms countering the dos and ddos problems
    • T. Peng, C. Leckie, and K. Ramamohanarao Survey of network-based defense mechanisms countering the dos and ddos problems ACM Comput. Surv. 39 1 2007 3 http://dx.doi.org/10.1145/1216370.1216373
    • (2007) ACM Comput. Surv. , vol.39 , Issue.1 , pp. 3
    • Peng, T.1    Leckie, C.2    Ramamohanarao, K.3
  • 21
    • 68049121093 scopus 로고    scopus 로고
    • Anomaly detection: A survey
    • V. Chandola, A. Banerjee, and V. Kumar Anomaly detection: a survey ACM Comput. Surv. 41 3 2009 15:1 15:58 10.1145/1541880.1541882
    • (2009) ACM Comput. Surv. , vol.41 , Issue.3 , pp. 151-1558
    • Chandola, V.1    Banerjee, A.2    Kumar, V.3
  • 23
    • 62949129764 scopus 로고    scopus 로고
    • Extracting hidden anomalies using sketch and non Gaussian multiresolution statistical detection procedures
    • ACM New York, NY, USA
    • G. Dewaele, K. Fukuda, P. Borgnat, P. Abry, and K. Cho Extracting hidden anomalies using sketch and non Gaussian multiresolution statistical detection procedures Proceedings of the 2007 Workshop on Large Scale Attack Defense, LSAD'07 2007 ACM New York, NY, USA 145 152 http://dx.doi.org/10.1145/1352664.1352675
    • (2007) Proceedings of the 2007 Workshop on Large Scale Attack Defense, LSAD'07 , pp. 145-152
    • Dewaele, G.1    Fukuda, K.2    Borgnat, P.3    Abry, P.4    Cho, K.5
  • 28
    • 18144385431 scopus 로고    scopus 로고
    • Application of anomaly detection algorithms for detecting syn flooding attacks
    • GLOBECOM '04 IEEE
    • V. Siris, and F. Papagalou Application of anomaly detection algorithms for detecting syn flooding attacks Global Telecommunications Conference, 2004 GLOBECOM '04 vol. 4 2004 IEEE 2050 2054 http://dx.doi.org/10.1109/GLOCOM.2004.1378372
    • (2004) Global Telecommunications Conference, 2004 , vol.4 , pp. 2050-2054
    • Siris, V.1    Papagalou, F.2
  • 31
    • 36949007362 scopus 로고    scopus 로고
    • Challenging the anomaly detection paradigm: A provocative discussion
    • ACM New York, NY, USA
    • C. Gates, and C. Taylor Challenging the anomaly detection paradigm: a provocative discussion Proceedings of the 006 Workshop on New Security Paradigms, NSPW '06 2007 ACM New York, NY, USA 21 29 http://dx.doi.org/10.1145/1278940.1278945
    • (2007) Proceedings of the 006 Workshop on New Security Paradigms, NSPW '06 , pp. 21-29
    • Gates, C.1    Taylor, C.2
  • 32
    • 78650720508 scopus 로고    scopus 로고
    • The need for simulation in evaluating anomaly detectors
    • H. Ringberg, M. Roughan, and J. Rexford The need for simulation in evaluating anomaly detectors SIGCOMM Comput. Commun. Rev. 38 1 2008 55 59 10.1145/1341431.1341443
    • (2008) SIGCOMM Comput. Commun. Rev. , vol.38 , Issue.1 , pp. 55-59
    • Ringberg, H.1    Roughan, M.2    Rexford, J.3
  • 40
    • 85084160767 scopus 로고    scopus 로고
    • On gray-box program tracking for anomaly detection
    • SSYM'04 USENIX Association Berkeley, CA, USA < >
    • D. Gao, M.K. Reiter, and D. Song On gray-box program tracking for anomaly detection Proceedings of the 13th Conference on USENIX Security Symposium SSYM'04 vol. 13 2004 USENIX Association Berkeley, CA, USA 8 < http://dl.acm.org/citation.cfm?id=1251375.1251383 >
    • (2004) Proceedings of the 13th Conference on USENIX Security Symposium , vol.13 , pp. 8
    • Gao, D.1    Reiter, M.K.2    Song, D.3
  • 42
    • 80051791562 scopus 로고    scopus 로고
    • Toward cost-sensitive self-optimizing anomaly detection and response in autonomic networks
    • Z. Zhang, F. Nat-Abdesselam, P.-H. Ho, and Y. Kadobayashi Toward cost-sensitive self-optimizing anomaly detection and response in autonomic networks Comput. Secur. 30 6-7 2011 525 537
    • (2011) Comput. Secur. , vol.30 , Issue.67 , pp. 525-537
    • Zhang, Z.1    Nat-Abdesselam, F.2    Ho, P.-H.3    Kadobayashi, Y.4
  • 44
    • 33847290520 scopus 로고    scopus 로고
    • Mining anomalies using traffic feature distributions
    • A. Lakhina, M. Crovella, and C. Diot Mining anomalies using traffic feature distributions SIGCOMM Comput. Commun. Rev. 35 4 2005 217 228 http://dx.doi.org/10.1145/1090191.1080118
    • (2005) SIGCOMM Comput. Commun. Rev. , vol.35 , Issue.4 , pp. 217-228
    • Lakhina, A.1    Crovella, M.2    Diot, C.3
  • 48
    • 16344383315 scopus 로고    scopus 로고
    • Sampling for passive internet measurement: A review
    • N. Duffield Sampling for passive internet measurement: a review Stat. Sci. 19 2004 472 498
    • (2004) Stat. Sci. , vol.19 , pp. 472-498
    • Duffield, N.1
  • 50
    • 33144477616 scopus 로고    scopus 로고
    • Inverting sampled traffic
    • N. Hohn, and D. Veitch Inverting sampled traffic IEEE/ACM Trans. Network. 14 1 2006 68 80 10.1109/TNET.2005.863456
    • (2006) IEEE/ACM Trans. Network. , vol.14 , Issue.1 , pp. 68-80
    • Hohn, N.1    Veitch, D.2
  • 53
    • 77953294708 scopus 로고    scopus 로고
    • A signal processing view on packet sampling and anomaly detection
    • D. Brauckhoff, K. Salamatian, M. May, A signal processing view on packet sampling and anomaly detection, in: INFOCOM, 2010 Proceedings IEEE, 2010, pp. 1-9. http://dx.doi.org/10.1109/INFCOM.2010.5462154.
    • (2010) INFOCOM, 2010 Proceedings IEEE , pp. 1-9
    • Brauckhoff, D.1    Salamatian, K.2    May, M.3
  • 62
    • 0043166339 scopus 로고    scopus 로고
    • Anomaly detection in ip networks
    • M. Thottan, and C. Ji Anomaly detection in ip networks IEEE Trans. Signal Process. 51 8 2003 2191 2204
    • (2003) IEEE Trans. Signal Process. , vol.51 , Issue.8 , pp. 2191-2204
    • Thottan, M.1    Ji, C.2
  • 65
    • 59949095579 scopus 로고    scopus 로고
    • Network anomaly detection based on wavelet analysis
    • W. Lu, and A.A. Ghorbani Network anomaly detection based on wavelet analysis EURASIP J. Adv. Signal Process 2009 2009 4:1 4:16 10.1155/2009/837601
    • (2009) EURASIP J. Adv. Signal Process , vol.2009 , pp. 41-416
    • Lu, W.1    Ghorbani, A.A.2
  • 67
    • 33847761464 scopus 로고    scopus 로고
    • Non-Gaussian and long memory statistical characterizations for internet traffic with anomalies
    • A. Scherrer, N. Larrieu, P. Owezarski, P. Borgnat, and P. Abry Non-Gaussian and long memory statistical characterizations for internet traffic with anomalies IEEE Trans. Depend. Secur. Comput. 4 1 2007 56 70 http://dx.doi.org/10.1109/TDSC.2007.12
    • (2007) IEEE Trans. Depend. Secur. Comput. , vol.4 , Issue.1 , pp. 56-70
    • Scherrer, A.1    Larrieu, N.2    Owezarski, P.3    Borgnat, P.4    Abry, P.5
  • 68
    • 84878701863 scopus 로고    scopus 로고
    • Detecting anomalies in network traffic using maximum entropy estimation
    • USENIX Association Berkeley, CA, USA < >
    • Y. Gu, A. McCallum, and D. Towsley Detecting anomalies in network traffic using maximum entropy estimation Proceedings of the 5th ACM SIGCOMM Conference on Internet Measurement, IMC'05 2005 USENIX Association Berkeley, CA, USA 32 < http://dl.acm.org/citation.cfm?id=1251086.1251118 >
    • (2005) Proceedings of the 5th ACM SIGCOMM Conference on Internet Measurement, IMC'05 , pp. 32
    • Gu, Y.1    McCallum, A.2    Towsley, D.3
  • 70
    • 0036967463 scopus 로고    scopus 로고
    • Use of spectral analysis in defense against dos attacks
    • GLOBECOM'02 IEEE
    • C.-M. Cheng, H. Kung, and K.-S. Tan Use of spectral analysis in defense against dos attacks Global Telecommunications Conference, 2002 GLOBECOM'02 vol. 3 2002 IEEE 2143 2148 http://dx.doi.org/10.1109/GLOCOM.2002.1189011
    • (2002) Global Telecommunications Conference, 2002 , vol.3 , pp. 2143-2148
    • Cheng, C.-M.1    Kung, H.2    Tan, K.-S.3
  • 73
    • 84944486544 scopus 로고
    • Prediction and entropy of printed english
    • C.E. Shannon Prediction and entropy of printed english Bell Syst. Tech. J. 30 1951 50 64
    • (1951) Bell Syst. Tech. J. , vol.30 , pp. 50-64
    • Shannon, C.E.1
  • 75
    • 0242637092 scopus 로고    scopus 로고
    • Detecting intrusion with rule-based integration of multiple models
    • S.-J. Han, and S.-B. Cho Detecting intrusion with rule-based integration of multiple models Comput. Secur. 22 7 2003 613 623 10.1016/S0167-4048(03)00711-9
    • (2003) Comput. Secur. , vol.22 , Issue.7 , pp. 613-623
    • Han, S.-J.1    Cho, S.-B.2
  • 77
    • 0037209446 scopus 로고    scopus 로고
    • Host-based intrusion detection using dynamic and static behavioral models
    • D.-Y. Yeung, and Y. Ding Host-based intrusion detection using dynamic and static behavioral models Pattern Recogn. 36 2003 229 243
    • (2003) Pattern Recogn. , vol.36 , pp. 229-243
    • Yeung, D.-Y.1    Ding, Y.2
  • 78
    • 0023383894 scopus 로고
    • Bispectrum estimation: A digital signal processing framework
    • C. Nikias, and M.R. Raghuveer Bispectrum estimation: a digital signal processing framework Proc. IEEE 75 7 1987 869 891 10.1109/PROC.1987.13824
    • (1987) Proc. IEEE , vol.75 , Issue.7 , pp. 869-891
    • Nikias, C.1    Raghuveer, M.R.2
  • 80
    • 0024705330 scopus 로고
    • Time-frequency distributions - A review
    • L. Cohen Time-frequency distributions - a review Proc. IEEE 77 7 1989 941 981 10.1109/5.30749
    • (1989) Proc. IEEE , vol.77 , Issue.7 , pp. 941-981
    • Cohen, L.1
  • 81
    • 59949095579 scopus 로고    scopus 로고
    • Network anomaly detection based on wavelet analysis
    • W. Lu, and A.A. Ghorbani Network anomaly detection based on wavelet analysis EURASIP J. Adv. Signal Process 2009 2009 4:1 4:16 10.1155/2009/837601
    • (2009) EURASIP J. Adv. Signal Process , vol.2009 , pp. 41-416
    • Lu, W.1    Ghorbani, A.A.2
  • 82
    • 0031222502 scopus 로고    scopus 로고
    • Proactive network-fault detection [telecommunications]
    • C. Hood, and C. Ji Proactive network-fault detection [telecommunications] IEEE Trans. Reliab. 46 3 1997 333 341 10.1109/24.664004
    • (1997) IEEE Trans. Reliab. , vol.46 , Issue.3 , pp. 333-341
    • Hood, C.1    Ji, C.2
  • 83
    • 77953098563 scopus 로고    scopus 로고
    • Anomaly detection through a bayesian support vector machine
    • V. Sotiris, P. Tse, and M. Pecht Anomaly detection through a bayesian support vector machine IEEE Trans. Reliab. 59 2 2010 277 286 10.1109/TR.2010.2048740
    • (2010) IEEE Trans. Reliab. , vol.59 , Issue.2 , pp. 277-286
    • Sotiris, V.1    Tse, P.2    Pecht, M.3
  • 87
    • 39049161433 scopus 로고    scopus 로고
    • Identification of repeated denial of service attacks
    • IEEE Barcelona, Spain < >
    • A. Hussain, J. Heidemann, and C. Papadopoulos Identification of repeated denial of service attacks Proceedings of the IEEE Infocom 2006 IEEE Barcelona, Spain < http://www.isi.edu/johnh/PAPERS/Hussain06a.html >
    • (2006) Proceedings of the IEEE Infocom
    • Hussain, A.1    Heidemann, J.2    Papadopoulos, C.3
  • 88
    • 0011875790 scopus 로고
    • Probability theory
    • fourth ed. Springer-Verlag vol. II
    • M. Loève Probability theory fourth ed. Graduate Texts in Mathematics vol. 46 1978 Springer-Verlag vol. II
    • (1978) Graduate Texts in Mathematics , vol.46
    • Loève, M.1
  • 89
    • 85024429815 scopus 로고
    • A new approach to linear filtering and prediction problems
    • R. Kalman A new approach to linear filtering and prediction problems J. Basic Eng. 1 82 1960 35 45
    • (1960) J. Basic Eng. , vol.1 , Issue.82 , pp. 35-45
    • Kalman, R.1
  • 91
    • 84877644867 scopus 로고    scopus 로고
    • Towards the improvement of diagnostic metrics fault diagnosis for dsl-based iptv networks using the Renyi entropy
    • A. Marnerides, S. Malinowski, R. Morla, M. Rodrigues, H. Kim, Towards the improvement of diagnostic metrics fault diagnosis for dsl-based iptv networks using the Renyi entropy, in: Global Communications Conference (GLOBECOM), 2012 IEEE, 2012, pp. 2779-2784. http://dx.doi.org/10.1109/GLOCOM.2012.6503537.
    • (2012) Global Communications Conference (GLOBECOM), 2012 IEEE , pp. 2779-2784
    • Marnerides, A.1    Malinowski, S.2    Morla, R.3    Rodrigues, M.4    Kim, H.5
  • 92
    • 0033242934 scopus 로고    scopus 로고
    • Nonextensive statistics: Theoretical, experimental and computational evidences and connections
    • C. Tsallis Nonextensive statistics: theoretical, experimental and computational evidences and connections Braz. J. Phys. 29 cond-mat/9903356 1999 1 35
    • (1999) Braz. J. Phys. , vol.29 , pp. 1-35
    • Tsallis, C.1
  • 96
  • 100
    • 70349259625 scopus 로고    scopus 로고
    • Ipsumdump Tool < http://www.cs.ucla.edu/kohler/ipsumdump/ >.
    • Ipsumdump Tool
  • 101
    • 84907497163 scopus 로고    scopus 로고
    • Caida's Coralreef Tool < http://www.caida.org/tools/measurement/coralreef/ >.
    • Caida's Coralreef Tool
  • 102
    • 84885406311 scopus 로고    scopus 로고
    • Wireshark < http://www.wireshark.org >.
    • Wireshark
  • 103
    • 84907497162 scopus 로고    scopus 로고
    • Snort ad Tool < http://anomalydetection.info/ >.
    • Snort Ad Tool


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.