DocumentCode :
3005600
Title :
Detecting communication anomalies in tactical networks via graph learning
Author :
Vashist, Akshay ; Chadha, R. ; Kaplan, M. ; Moeltner, K.
Author_Institution :
Appl. Commun. Sci., One Telcordia Dr, Piscataway, NJ, USA
fYear :
2012
fDate :
Oct. 29 2012-Nov. 1 2012
Firstpage :
1
Lastpage :
6
Abstract :
A widely practiced approach for detecting suspicious communication in a network is to formulate the problem as statistical anomaly detection. However, the communication patterns in mission-oriented tactical networks are highly variable and have a much richer structure than incorporated by existing anomaly detection methods. For instance, the legitimacy of a communication may depend on who sends the message to who, when and under what circumstances. Existing anomaly detection methods insensitively aggregate data losing critical contextual information about the structure of communication and as a consequence, they either fail to detect suspicious communication or produce excessive amount of false positives. We have developed an extended graph based anomaly detection method that allows us to incorporate the context and rich structure of communication in a mission-oriented tactical network to model and detect suspicious patterns. We use a vector-weighted multidigraph representation to model communication and use a given data to learn the graph, i.e., to determine the nodes, the edges, and their statistical attributes corresponding to normal communication. We then use deviations from the attributes of normal communications to detect the suspicious ones. We have applied the proposed approach to detect suspicious communication in a MANET comprising of USRP2 radios and successfully demonstrated the approach in TRL-6 demonstration of the TITAN project at Fort Dix. While our proposed approach is very general, only a part of it applies to the MANET under consideration and we used it to successfully detect various types of illegal messages, congestion, and the DDoS attack.
Keywords :
graph theory; military communication; mobile ad hoc networks; statistical analysis; telecommunication security; DDoS attack; MANET; TITAN project; TRL-6 demonstration; USRP2 radios; anomaly detection methods; communication anomaly detection; communication legitimacy; communication patterns; congestion; critical contextual information; extended graph based anomaly detection method; false positives; graph learning; illegal messages; mission-oriented tactical networks; normal communication; statistical anomaly detection; statistical attributes; suspicious communication; suspicious pattern detection; vector-weighted multidigraph representation; Correlation; Data models; Frequency measurement; Image edge detection; Mobile ad hoc networks; Receivers; Vectors; Anomaly detection; Empirical distribution estimation; Graph based anomaly detection; Information assurance; MANETs;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
MILITARY COMMUNICATIONS CONFERENCE, 2012 - MILCOM 2012
Conference_Location :
Orlando, FL
ISSN :
2155-7578
Print_ISBN :
978-1-4673-1729-0
Type :
conf
DOI :
10.1109/MILCOM.2012.6415763
Filename :
6415763
Link To Document :
بازگشت