[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
10.1145/1811039.1811095acmconferencesArticle/Chapter ViewAbstractPublication PagesmetricsConference Proceedingsconference-collections
poster

Detecting traffic anomalies using an equilibrium property

Published: 14 June 2010 Publication History

Abstract

When many flows are multiplexed on a non-saturated link, their volume changes over short timescales tend to cancel each other out, making the average change across flows close to zero. This equilibrium property holds if the flows are nearly independent, and it is violated by traffic changes caused by several correlated flows. We exploit this empirical property to design a computationally simple anomaly detection method.

References

[1]
N. Hohn, D. Veitch, and P. Abry. Cluster Processes, a Natural Language for Network Traffic. IEEE Transactions on Networking, pages 2229--2244, 2003.
[2]
F. Silveira, C. Diot, N. Taft, and R. Govindan. ASTUTE: Detecting a Different Class of Traffic Anomalies. Technical report, Technicolor, 2010. http://www.thlab.net/~fernando/papers/astute.pdf.

Cited By

View all
  • (2016)An unsupervised approach for traffic trace sanitization based on the entropy spacesTelecommunications Systems10.1007/s11235-015-0017-661:3(609-626)Online publication date: 1-Mar-2016
  • (2012)Detecting anomalous network hosts by means of PCA2012 IEEE International Workshop on Information Forensics and Security (WIFS)10.1109/WIFS.2012.6412633(103-108)Online publication date: Dec-2012

Index Terms

  1. Detecting traffic anomalies using an equilibrium property

    Recommendations

    Comments

    Please enable JavaScript to view thecomments powered by Disqus.

    Information & Contributors

    Information

    Published In

    cover image ACM Conferences
    SIGMETRICS '10: Proceedings of the ACM SIGMETRICS international conference on Measurement and modeling of computer systems
    June 2010
    398 pages
    ISBN:9781450300384
    DOI:10.1145/1811039
    • cover image ACM SIGMETRICS Performance Evaluation Review
      ACM SIGMETRICS Performance Evaluation Review  Volume 38, Issue 1
      Performance evaluation review
      June 2010
      382 pages
      ISSN:0163-5999
      DOI:10.1145/1811099
      Issue’s Table of Contents

    Sponsors

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 14 June 2010

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. anomaly detection
    2. statistical test

    Qualifiers

    • Poster

    Conference

    SIGMETRICS '10
    Sponsor:

    Acceptance Rates

    Overall Acceptance Rate 459 of 2,691 submissions, 17%

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)0
    • Downloads (Last 6 weeks)0
    Reflects downloads up to 09 Jan 2025

    Other Metrics

    Citations

    Cited By

    View all
    • (2016)An unsupervised approach for traffic trace sanitization based on the entropy spacesTelecommunications Systems10.1007/s11235-015-0017-661:3(609-626)Online publication date: 1-Mar-2016
    • (2012)Detecting anomalous network hosts by means of PCA2012 IEEE International Workshop on Information Forensics and Security (WIFS)10.1109/WIFS.2012.6412633(103-108)Online publication date: Dec-2012

    View Options

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media