Abstract
Methods and algorithms for detection of traffic anomalies in multi-service networks play a key role in creating the malware intrusion detection and prevention systems in modern communication infrastructures. The major requirement imposed to such systems is the ability to find anomalies and, respectively, intrusions in real time. Complexity of this problem is caused in many ways by incompleteness, discrepancy and variety of distribution laws at streams in a multi-service traffic. The paper represents a new technique for traffic anomaly detection in multiservice networks. It is based on using modified adaptation algorithms without identification and fuzzy logical inference rules. Results of an experimental assessment of the technique are discussed.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Stanwyck, D.: Profitable Deploying Services in the Next Generation Network. In: Voice-in-the Net Japan, Tokyo, Key3Media (2002).
Kanáliková, A.: Services In Ngn – Next Generation Networks. In: Journal of Information, Control and Management Systems, Vol. 3, No. 2, pp.97-102 (2005).
Wood, R.: Next-Generation Network Services. Cisco Press, USA (2008).
Gorodetski, V., Kotenko, I., Karsaev, O.: Multi-agent technologies for computer network security: Attack simulation, intrusion detection and intrusion detection learning. In: International Journal of Computer Systems Science & Engineering, No.4, pp.191-200 (2003).
Kotenko, I., Saenko, I., Ageev, S.: Countermeasure Security Risks Management in the Internet of Things based on Fuzzy Logic Inference. In: The 14th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom-2015), pp.655-6598 (2015).
Paxson, V.: A System for Detecting Network Intruders in Real-Time. In: Proc. of the 7th USENIX Security Symposium, San Antonio, Texas, January 26-29 (1998).
Paxson, V.: A System for Detecting Network Intruders in Real-Time. In: Computers Networks, No.31, pp. 2435-2463 (1999).
Laskin, N., Lambadaries, I., Harmatzis, F.C., Devetsikiotis, M.: Fractional Levy motion and its application to network traffic modeling. In: Elsevier Comp. Network, Vol. 40, pp.363-375 (2002).
Dang, T.D.: New results in multifractal traffic analysis and modeling, Budapest (2002).
Ageev, S., Vasil’ev, K.: Adaptive Algorithms for Decorrelation to Image Processing. In: Pattern Recognition and Image Analysis, Vol.11, No.1, pp.131-134 (2001).
Takagi, T., Sugeno, M.: Fuzzy Identification of Systems and Its Applications to Modeling and Control. In: IEEE Trans. on System, Man and Cybernetics, Vol.15, No.1, pp.11-132 (1985).
Wang, H., Zhang, D., Shin, K.G.: Detecting syn flooding attacks. In: Proc. of IEEE INFOCOM (2002).
Staniford, S., Hoagland, J., MCalerney, J.M.: Practical automated detection of stealthy portscans. In: Proc. of the IDS Workshop of the 7th Computer and Communications Security Conference (2000).
Brutlag, J.D.: Aberrant behavior detection in time series for network service monitoring. In: Proc. of the 14th Systems Administration Conference, pp.139-146 (2000).
Thottan, M., Ji, C.: Anomaly detection in IP networks. In: IEEE Trans. Signal Processing, Vol.51 (2003).
Kotenko, I., Saenko, I., Ageev, S., Kopchak, Y.: Abnormal Traffic Detection in networks of the Internet of things based on fuzzy logical inference. In: Proc. of the XVIII International Conference on Soft Computing and Measurements (SCM’2015). IEEE Xplore, pp.5-8 (2015).
Spall, L.C. Introduction to Stochastic Search and Optimization: Estimation, Simulation and Control, John Wiley Hoboken, NJ (2003).
Polyak, B.T., Tsypkin, Ya.Z. Pseudogradient adaptation and learning algorithms. In: Automation and Remote Control, No. 3(34), pp.377-397 (1973).
Calafiore, G., Polyak, B.T., Stochastic algorithms for exact and approximate feasibility of robust LMIs. In: IEEE Trans. on Automatic Control, Vol.46, No.11, pp.1755-1759 (2001).
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2017 Springer International Publishing AG
About this paper
Cite this paper
Saenko, I., Ageev, S., Kotenko, I. (2017). Detection of traffic anomalies in multi-service networks based on a fuzzy logical inference. In: Badica, C., et al. Intelligent Distributed Computing X. IDC 2016. Studies in Computational Intelligence, vol 678. Springer, Cham. https://doi.org/10.1007/978-3-319-48829-5_8
Download citation
DOI: https://doi.org/10.1007/978-3-319-48829-5_8
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-48828-8
Online ISBN: 978-3-319-48829-5
eBook Packages: EngineeringEngineering (R0)