Home > Research > Publications & Outputs > Distributed, multi-level network anomaly detect...

Electronic data

  • IEEE_ICC2017_crc

    Rights statement: ©2017 IEEE. Personal use of this material is permitted. However, permission to reprint/republish this material for advertising or promotional purposes or for creating new collective works for resale or redistribution to servers or lists, or to reuse any copyrighted component of this work in other works must be obtained from the IEEE.

    Accepted author manuscript, 238 KB, PDF document

    Available under license: CC BY-NC: Creative Commons Attribution-NonCommercial 4.0 International License

Links

Text available via DOI:

View graph of relations

Distributed, multi-level network anomaly detection for datacentre networks

Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

Published
Close
Publication date31/07/2017
Host publicationIEEE International Conference on Communications (ICC) 2017
PublisherIEEE
Number of pages6
ISBN (electronic)9781467389990
ISBN (print)9781467390002
<mark>Original language</mark>English
EventIEEE ICC 2017: IEEE International Conference in Comunications - Paris, Paris, France
Duration: 21/05/201725/05/2017
http://icc2017.ieee-icc.org/

Conference

ConferenceIEEE ICC 2017: IEEE International Conference in Comunications
Abbreviated titleIEEE ICC 2017
Country/TerritoryFrance
CityParis
Period21/05/1725/05/17
Internet address

Conference

ConferenceIEEE ICC 2017: IEEE International Conference in Comunications
Abbreviated titleIEEE ICC 2017
Country/TerritoryFrance
CityParis
Period21/05/1725/05/17
Internet address

Abstract

Over the past decade, numerous systems have been proposed to detect and subsequently prevent or mitigate security vulnerabilities. However, many existing intrusion or anomaly detection solutions are limited to a subset of the traffic due to scalability issues, hence failing to operate at line-rate on large, high-speed datacentre networks. In this paper, we present a two-level solution for anomaly detection leveraging independent execution and message passing semantics. We employ these constructs within a network-wide distributed anomaly detection framework that allows for greater detection accuracy and bandwidth cost saving through attack path reconstruction. Experimental results using real operational traffic traces and known network attacks generated through the Pytbull IDS evaluation framework, show that our approach is capable of detecting anomalies in a timely manner while allowing reconstruction of the attack path, hence further enabling the composition of advanced mitigation strategies. The resulting system shows high detection accuracy when compared to similar techniques, at least 20% better at detecting anomalies, and enables full path reconstruction even at small-to-moderate attack traffic intensities (as a fraction of the total traffic), saving up to 75% of bandwidth due to early attack detection.

Bibliographic note

©2017 IEEE. Personal use of this material is permitted. However, permission to reprint/republish this material for advertising or promotional purposes or for creating new collective works for resale or redistribution to servers or lists, or to reuse any copyrighted component of this work in other works must be obtained from the IEEE.