Anomaly Characterization in Flow-Based Traffic Time Series

  • Authors:
  • Anna Sperotto;Ramin Sadre;Aiko Pras

  • Affiliations:
  • Centre for Telematics and Information Technology Faculty of Electrical Engineering, Mathematics and Computer Science, University of Twente, Enschede, The Netherlands 7500 AE;Centre for Telematics and Information Technology Faculty of Electrical Engineering, Mathematics and Computer Science, University of Twente, Enschede, The Netherlands 7500 AE;Centre for Telematics and Information Technology Faculty of Electrical Engineering, Mathematics and Computer Science, University of Twente, Enschede, The Netherlands 7500 AE

  • Venue:
  • IPOM '08 Proceedings of the 8th IEEE international workshop on IP Operations and Management
  • Year:
  • 2008

Quantified Score

Hi-index 0.00

Visualization

Abstract

The increasing number of network attacks causes growing problems for network operators and users. Not only do these attacks pose direct security threats to our infrastructure, but they may also lead to service degradation, due to the massive traffic volume variations that are possible during such attacks. The recent spread of Gbps network technology made the problem of detecting these attacks harder, since existing packet-based monitoring and intrusion detection systems do not scale well to Gigabit speeds. Therefore the attention of the scientific community is shifting towards the possible use of aggregated traffic metrics. The goal of this paper is to investigate how malicious traffic can be characterized on the basis of such aggregated metrics, in particular by using flow, packet and byte frequency variations over time. The contribution of this paper is that it shows, based on a number of real case studies on high-speed networks, that all three metrics may be necessary for proper time series anomaly characterization.