Abstract

In this article, we address the problem of not only id entifying phenomena, but also attributing the phenomenon to the movement that induces it. This causes to a combinatorial optimisation problem, which is prohibitively expensive. Instead we design two anomaly detection algorithms that are small in complexity. The first is based on the system for cross-entropy (CE), which identifies flow anomalies and labels flow anomalies. The second algorithm detects anomalies through GLRT on aggregated flow transformation a compact low-dimensional representation of raw traffic flows. The two algorithms complement each other and allow the network operator to use the algorithm for flow aggregation first so that device irregularities can be identified easily. After discovery of an exception, the user Can analyse further that individual flows are anomalous using CE-based algorithm. We perform extensive performance tests and trials on synthetic and semi-synthetic data with our algorithms, as well as real Internet traffic data gathered from the MAWI database, and finally make recommendations as to their usability.

Highlights

  • This method is obviously suboptimal, as the combined number of measurements of flows does not decompose into individual flows; As such, the joint density should be considered by a rational statistical analysis and the detection algorithms built based on this number

  • The resulting estimation is based on a stream conglomeration that assumes a traditional, low-dimensional representation of the sources of coarse flow

  • NBAD is a vital piece of system conduct investigation (NBA) that provides an additional layer of security for that given by the usual enemy

Read more

Summary

Anomaly Detection and Attribution in Network

Abstract:In this article, we address the problem of id entifying phenomena, and attributing the phenomenon to the movement that induces it. This causes to a combinatorial optimisation problem, which is prohibitively expensive. Instead we design two anomaly detection algorithms that are small in complexity. The first is based on the system for cross-entropy (CE), which identifies flow anomalies and labels flow anomalies. The second algorithm detects anomalies through GLRT on aggregated flow transformation a compact low-dimensional representation of raw traffic flows. The two algorithms complement each other and allow the network operator to use the algorithm for flow aggregation first so that device irregularities can be identified .

INTRODUCTION
Institute of Science and
EXISTING SYSTEMS
PROPOSED SYSTEM
PROBLEM STATEMENT
MODULE DESCRIPTION
View Traffic
View anomaly detection
CONCLUSION
Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.