The need for simulation in evaluating anomaly detectors

  • Authors:
  • Haakon Ringberg;Matthew Roughan;Jennifer Rexford

  • Affiliations:
  • Princeton University;University of Adelaide;Princeton University

  • Venue:
  • ACM SIGCOMM Computer Communication Review
  • Year:
  • 2008

Quantified Score

Hi-index 0.00

Visualization

Abstract

Anomalous events that affect the performance of networks are a fact of life. It is therefore not surprising that recent years have seen an explosion in research on network anomaly detection. What is quite surprising, however, is the lack of controlled evaluation of these detectors. In this paper we argue that there are numerous important questions regarding the effectiveness of anomaly detectors that cannot be answered by the evaluation techniques employed today. We present four central requirements of a rigorous evaluation that can only be met by simulating both the anomaly and its surrounding environment. While simulation is necessary, it is not sufficient. We therefore present an outline of an evaluation methodology that leverages both simulation and traces from operational networks