Anomaly Extraction in Backbone Networks Using Association Rules - Archive ouverte HAL Accéder directement au contenu
Article Dans Une Revue Proceedings of the 9th ACM SIGCOMM conference on Internet measurement conference Année : 2009

Anomaly Extraction in Backbone Networks Using Association Rules

Résumé

Anomaly extraction is an important problem essential to several applications ranging from root cause analysis, to attack mitigation, and testing anomaly detectors. Anomaly extraction is preceded by an anomaly detection step, which detects anomalous events and may identify a large set of possible associated event flows. The goal of anomaly extraction is to find and summarize the set of flows that are effectively caused by the anomalous event. In this work, we use meta-data provided by several histogram-based detectors to identify suspicious flows and then apply association rule mining to find and summarize the event flows. Using rich traffic data from a backbone network (SWITCH/AS559), we show that we can reduce the classification cost, in terms of items (flows or rules) that need to be classified, by several orders of magnitude. Further, we show that our techniques effectively isolate event flows in all analyzed cases and that on average trigger between 2 and 8.5 false positives, which can be trivially sorted out by an administrator.
Fichier principal
Vignette du fichier
p28-brauckhoff.pdf (368.53 Ko) Télécharger le fichier
Origine : Fichiers produits par l'(les) auteur(s)
Loading...

Dates et versions

hal-00527139 , version 1 (18-10-2010)

Identifiants

  • HAL Id : hal-00527139 , version 1

Citer

Daniela Brauckhoff, Xenofontas Dimitropoulos, Arno Wagner, Kavé Salamatian. Anomaly Extraction in Backbone Networks Using Association Rules. Proceedings of the 9th ACM SIGCOMM conference on Internet measurement conference, 2009, pp.28-34. ⟨hal-00527139⟩
62 Consultations
520 Téléchargements

Partager

Gmail Facebook X LinkedIn More