TY - CONF
T1 - Detecting anomalous traffic using communication graphs
AU - Ishibashi, Keisuke
AU - Kondoh, Tsuyoshi
AU - Harada, Shigeaki
AU - Mori, Tatsuya
AU - Kawahara, Ryoichi
AU - Asano, Shoichiro
N1 - Funding Information:
This study was supported in part by the Ministry of Internal Affairs and Communications of Japan.
Publisher Copyright:
© 2010 World Telecommunications Congress 2010, WTC 2010. All rights reserved.
PY - 2010
Y1 - 2010
N2 - We present a method to detect anomalies in a time series of inter-host communication patterns. There are many existing methods for anomaly detection in a time series of traffic volume data, such as number of packets or bytes. However, there is no established method detecting anomalies in a time series of communication patterns that can be represented as graphs. Extracting communication structure enables us to identify low-intensity anomalous network events, e.g., botnet command and control communications, which cannot be detected with conventional volume-based anomaly detection schemes. In this paper, we first define the similarity of two graphs, and then we present a method to detect any anomalous graph that has little similarity with other graphs. This method was evaluated with actual traffic data, and anomalous graphs in which new clusters appeared were detected.
AB - We present a method to detect anomalies in a time series of inter-host communication patterns. There are many existing methods for anomaly detection in a time series of traffic volume data, such as number of packets or bytes. However, there is no established method detecting anomalies in a time series of communication patterns that can be represented as graphs. Extracting communication structure enables us to identify low-intensity anomalous network events, e.g., botnet command and control communications, which cannot be detected with conventional volume-based anomaly detection schemes. In this paper, we first define the similarity of two graphs, and then we present a method to detect any anomalous graph that has little similarity with other graphs. This method was evaluated with actual traffic data, and anomalous graphs in which new clusters appeared were detected.
UR - http://www.scopus.com/inward/record.url?scp=84870499414&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=84870499414&partnerID=8YFLogxK
M3 - Paper
AN - SCOPUS:84870499414
SP - 192
EP - 197
T2 - World Telecommunications Congress 2010, WTC 2010
Y2 - 13 September 2010 through 14 September 2010
ER -