Characterization of Network-Wide Anomalies in Traffic FlowsReport as inadecuate


Characterization of Network-Wide Anomalies in Traffic Flows


Characterization of Network-Wide Anomalies in Traffic Flows - Download this document for free, or read online. Document in PDF available to download.

Abstract

Detecting and understanding anomalies in IP networks is an open and ill-defined problem. Toward this end, we have recently proposed the subspace method for anomaly diagnosis. In this paper we present the first large-scale exploration of the power of the subspace method when applied to flow traffic. An important aspect of this approach is that it fuses information from flow measurements taken throughout a network. We apply the subspace method to three different types of sampled flow traffic in a large academic network: multivariate timeseries of byte counts, packet counts, and IP-flow counts. We show that each traffic type brings into focus a different set of anomalies via the subspace method. We illustrate and classify the set of anomalies detected. We find that almost all of the anomalies detected represent events of interest to network operators. Furthermore, the anomalies span a remarkably wide spectrum of event types, including denial of service attacks single-source and distributed, flash crowds, port scanning, downstream traffic engineering, high-rate flows, worm propagation, and network outage.

CAS: Computer Science: Technical Reports -



Author: Lakhina, Anukool - Crovella, Mark - Diot, Christophe - -

Source: https://open.bu.edu/







Related documents