z-logo
open-access-imgOpen Access
Anomaly Detection and Attribution in Network
Author(s) -
V. Karthik Raj,
M Mukesh,
J. Kalaivani
Publication year - 2020
Publication title -
international journal of engineering and advanced technology
Language(s) - English
Resource type - Journals
ISSN - 2249-8958
DOI - 10.35940/ijeat.c6335.029320
Subject(s) - anomaly detection , computer science , data mining , flow network , complement (music) , representation (politics) , usability , internet traffic , entropy (arrow of time) , the internet , algorithm , theoretical computer science , mathematics , mathematical optimization , biochemistry , chemistry , physics , human–computer interaction , quantum mechanics , complementation , politics , world wide web , gene , political science , law , phenotype
In this article, we address the problem of not only id entifying phenomena, but also attributing the phenomenon to the movement that induces it. This causes to a combinatorial optimisation problem, which is prohibitively expensive. Instead we design two anomaly detection algorithms that are small in complexity. The first is based on the system for cross-entropy (CE), which identifies flow anomalies and labels flow anomalies. The second algorithm detects anomalies through GLRT on aggregated flow transformation a compact low-dimensional representation of raw traffic flows. The two algorithms complement each other and allow the network operator to use the algorithm for flow aggregation first so that device irregularities can be identified easily. After discovery of an exception, the user Can analyse further that individual flows are anomalous using CE-based algorithm. We perform extensive performance tests and trials on synthetic and semi-synthetic data with our algorithms, as well as real Internet traffic data gathered from the MAWI database, and finally make recommendations as to their usability.

The content you want is available to Zendy users.

Already have an account? Click here to sign in.
Having issues? You can contact us here