[ACM Press the 7th ACM SIGCOMM conference - San Diego, California, USA (2007.10.24-2007.10.26)] Proceedings of the 7th ACM SIGCOMM conference on Internet measurement - IMC '07 - Challenging the supremacy of traffic matrices in anomaly detection
β Scribed by Soule, Augustin; Silveira, Fernando; Ringberg, Haakon; Diot, Christophe
- Book ID
- 125474407
- Publisher
- ACM Press
- Year
- 2007
- Weight
- 385 KB
- Category
- Article
- ISBN
- 1595939083
No coin nor oath required. For personal study only.
β¦ Synopsis
Multiple network-wide anomaly detection techniques proposed in the literature define an anomaly as a statistical outlier in aggregated network traffic. The most popular way to aggregate the traffic is as a Traffic Matrix, where the traffic is divided according to its ingress and egress points in the network. However, the reasons for choosing traffic matrices instead of any other formalism have not been studied yet. In this paper we compare three network-driven traffic aggregation formalisms: ingress routers, input links and origin-destination pairs (i.e. traffic matrices). Each formalism is computed on data collected from two research backbones. Then, a network-wide anomaly detection method is applied to each formalism. All anomalies are manually labeled, as a true or false positive. Our results show that the traffic aggregation level has a significant impact on the number of anomalies detected and on the false positive rate. We show that aggregating by OD pairs is indeed the most appropriate choice for the data sets and the detection method we consider. We correlate our observations with time series statistics in order to explain how aggregation impacts anomaly detection.
π SIMILAR VOLUMES
The Secure Socket Layer (SSL) and its variant, Transport Layer Security (TLS), are used toward ensuring server security. In this paper, we characterize the cryptographic strength of public servers running SSL/TLS. We present a tool developed for this purpose, the Probing SSL Security Tool (PSST), an