Anomaly extraction in backbone networks using association rules

  • Authors:
  • Daniela Brauckhoff;Xenofontas Dimitropoulos;Arno Wagner;Kavè Salamatian

  • Affiliations:
  • ETH Zurich, Zurich, Switzerland;ETH Zurich, Zurich, Switzerland;ETH Zurich, Zurich, Switzerland;Lancaster University, Lancaster, United Kingdom

  • Venue:
  • Proceedings of the 9th ACM SIGCOMM conference on Internet measurement conference
  • Year:
  • 2009

Quantified Score

Hi-index 0.00

Visualization

Abstract

Anomaly extraction is an important problem essential to several applications ranging from root cause analysis, to attack mitigation, and testing anomaly detectors. Anomaly extraction is preceded by an anomaly detection step, which detects anomalous events and may identify a large set of possible associated event flows. The goal of anomaly extraction is to find and summarize the set of flows that are effectively caused by the anomalous event. In this work, we use meta-data provided by several histogram-based detectors to identify suspicious flows and then apply association rule mining to find and summarize the event flows. Using rich traffic data from a backbone network (SWITCH/AS559), we show that we can reduce the classification cost, in terms of items (flows or rules) that need to be classified, by several orders of magnitude. Further, we show that our techniques effectively isolate event flows in all analyzed cases and that on average trigger between 2 and 8.5 false positives, which can be trivially sorted out by an administrator.