𝔖 Bobbio Scriptorium
✦   LIBER   ✦

[ACM Press the 7th ACM SIGCOMM conference - San Diego, California, USA (2007.10.24-2007.10.26)] Proceedings of the 7th ACM SIGCOMM conference on Internet measurement - IMC '07 - Challenging the supremacy of traffic matrices in anomaly detection

✍ Scribed by Soule, Augustin; Silveira, Fernando; Ringberg, Haakon; Diot, Christophe


Book ID
125474407
Publisher
ACM Press
Year
2007
Weight
385 KB
Category
Article
ISBN
1595939083

No coin nor oath required. For personal study only.

✦ Synopsis


Multiple network-wide anomaly detection techniques proposed in the literature define an anomaly as a statistical outlier in aggregated network traffic. The most popular way to aggregate the traffic is as a Traffic Matrix, where the traffic is divided according to its ingress and egress points in the network. However, the reasons for choosing traffic matrices instead of any other formalism have not been studied yet. In this paper we compare three network-driven traffic aggregation formalisms: ingress routers, input links and origin-destination pairs (i.e. traffic matrices). Each formalism is computed on data collected from two research backbones. Then, a network-wide anomaly detection method is applied to each formalism. All anomalies are manually labeled, as a true or false positive. Our results show that the traffic aggregation level has a significant impact on the number of anomalies detected and on the false positive rate. We show that aggregating by OD pairs is indeed the most appropriate choice for the data sets and the detection method we consider. We correlate our observations with time series statistics in order to explain how aggregation impacts anomaly detection.


πŸ“œ SIMILAR VOLUMES


[ACM Press the 7th ACM SIGCOMM conferenc
✍ Lee, Homin K.; Malkin, Tal; Nahum, Erich πŸ“‚ Article πŸ“… 2007 πŸ› ACM Press βš– 184 KB

The Secure Socket Layer (SSL) and its variant, Transport Layer Security (TLS), are used toward ensuring server security. In this paper, we characterize the cryptographic strength of public servers running SSL/TLS. We present a tool developed for this purpose, the Probing SSL Security Tool (PSST), an