DocumentCode :
3128262
Title :
Communication patterns based detection of anomalous network traffic
Author :
Le, Do Quoc ; Jeong, Taeyeol ; Roman, H. Eduardo ; Hong, James Won-Ki
Author_Institution :
Div. of IT Convergence Eng., Pohang Univ. of Sci. & Technol. (POSTECH), Pohang, South Korea
fYear :
2012
fDate :
11-14 June 2012
Firstpage :
185
Lastpage :
185
Abstract :
We propose a novel approach to detect anomalous network traffic by analyzing communication patterns in time series. The method is based on graph theory concepts such as degree distribution and maximum degree, and we introduce the new concept of dK-2 distance [1]. In our approach, we use traffic dispersion graphs (TDGs) to extract communication structure [2]. By analyzing differences of TDG graphs in time series we are able to detect anomalous events such as botnet command and control communications, which cannot be identified by using volume-based approaches or flows/packets counters. We evaluate our approach with the 1999 DARPA intrusion detection data set and the network trace from POSTECH on July 2009.
Keywords :
computer network security; graph theory; telecommunication traffic; DDoS attacks; TDG graphs; anomalous network traffic detection; botnet command-and-control communications; communication patterns based detection; communication structure extraction; dK-2 distance; degree distribution concept; graph theory concepts; maximum degree concept; network security; time series; traffic dispersion graphs; Computer crime; Dispersion; Intrusion detection; Measurement; Protocols; Telecommunication traffic; Time series analysis; DDoS attacks; anomalous trafic detection; network security; traffic dispersion graph;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Intelligence and Security Informatics (ISI), 2012 IEEE International Conference on
Conference_Location :
Arlington, VA
Print_ISBN :
978-1-4673-2105-1
Type :
conf
DOI :
10.1109/ISI.2012.6284297
Filename :
6284297
Link To Document :
بازگشت