首页 > 最新文献

Annual ACM Workshop on Mining Network Data最新文献

英文 中文
Building a prototype for network measurement virtual observatory 构建网络测量虚拟天文台样机
Pub Date : 2007-06-12 DOI: 10.1145/1269880.1269887
P. Mátray, I. Csabai, P. Hága, J. Stéger, L. Dobos, G. Vattay
Online sharing of scientific information has accelerated the research activity in various different domains of science. This fact inspires us to initiate this kind of approach in the field of network research and review some projects pointing towards this direction. Using the experiences of similar efforts in other domains of sciences we are building a prototype node for Network Measurement Virtual Observatory. The goal of the observatory is to stimulate network research through sharing available measurement data along with analysis results and providing easy-to-use "online" network data analysis tools for network research and management purposes. We would also like to initiate discussion about standardization of network measurement data and to motivate other researchers to publish their own data and tools. In this paper we sketch the basic concept of Virtual Observatories and present a prototype system developed to share measurement data and tools associated with the ETOMIC measurement infrastructure.
科学信息的在线共享加速了各个科学领域的研究活动。这一事实启发我们在网络研究领域开创了这种方法,并回顾了一些指向这一方向的项目。利用在其他科学领域类似工作的经验,我们正在构建一个网络测量虚拟天文台的原型节点。天文台的目标是通过共享现有的测量数据和分析结果,以及为网络研究和管理目的提供易于使用的“在线”网络数据分析工具,来促进网络研究。我们也想发起关于网络测量数据标准化的讨论,并激励其他研究人员发表他们自己的数据和工具。在本文中,我们概述了虚拟天文台的基本概念,并提出了一个原型系统,用于共享与ETOMIC测量基础设施相关的测量数据和工具。
{"title":"Building a prototype for network measurement virtual observatory","authors":"P. Mátray, I. Csabai, P. Hága, J. Stéger, L. Dobos, G. Vattay","doi":"10.1145/1269880.1269887","DOIUrl":"https://doi.org/10.1145/1269880.1269887","url":null,"abstract":"Online sharing of scientific information has accelerated the research activity in various different domains of science. This fact inspires us to initiate this kind of approach in the field of network research and review some projects pointing towards this direction. Using the experiences of similar efforts in other domains of sciences we are building a prototype node for Network Measurement Virtual Observatory. The goal of the observatory is to stimulate network research through sharing available measurement data along with analysis results and providing easy-to-use \"online\" network data analysis tools for network research and management purposes. We would also like to initiate discussion about standardization of network measurement data and to motivate other researchers to publish their own data and tools. In this paper we sketch the basic concept of Virtual Observatories and present a prototype system developed to share measurement data and tools associated with the ETOMIC measurement infrastructure.","PeriodicalId":216113,"journal":{"name":"Annual ACM Workshop on Mining Network Data","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-06-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131332820","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 23
SIP-based VoIP traffic behavior profiling and its applications 基于sip协议的VoIP话务行为分析及其应用
Pub Date : 2007-06-12 DOI: 10.1145/1269880.1269891
Hun-Jeong Kang, Zhi-Li Zhang, Supranamaya Ranjan, A. Nucci
With the widespread adoption of SIP-based VoIP, understanding the characteristics of SIP traffic behavior is critical to problem diagnosis and security protection of IP Telephony. In this paper, we propose a general methodology for profiling SIP-based VoIP traffic behavior at multiple levels: SIP server host, server entity and individual user levels. Using SIP traffic traces captured in a production VoIP service, we illustrate the characteristics of SIP-based VoIP traffic behavior in an operational network and demonstrate the effectiveness of our general profiling methodology. In particular, we show how our profiling methodology can help identify performance anomalies through a case study.
随着基于SIP协议的VoIP的广泛应用,了解SIP话务流的行为特征对IP电话的问题诊断和安全防护至关重要。在本文中,我们提出了一种在多个层次上分析基于SIP的VoIP流量行为的通用方法:SIP服务器主机、服务器实体和个人用户层次。使用在生产VoIP服务中捕获的SIP流量跟踪,我们说明了在运营网络中基于SIP的VoIP流量行为的特征,并演示了我们的一般分析方法的有效性。特别地,我们将通过案例研究展示我们的分析方法如何帮助识别性能异常。
{"title":"SIP-based VoIP traffic behavior profiling and its applications","authors":"Hun-Jeong Kang, Zhi-Li Zhang, Supranamaya Ranjan, A. Nucci","doi":"10.1145/1269880.1269891","DOIUrl":"https://doi.org/10.1145/1269880.1269891","url":null,"abstract":"With the widespread adoption of SIP-based VoIP, understanding the characteristics of SIP traffic behavior is critical to problem diagnosis and security protection of IP Telephony. In this paper, we propose a general methodology for profiling SIP-based VoIP traffic behavior at multiple levels: SIP server host, server entity and individual user levels. Using SIP traffic traces captured in a production VoIP service, we illustrate the characteristics of SIP-based VoIP traffic behavior in an operational network and demonstrate the effectiveness of our general profiling methodology. In particular, we show how our profiling methodology can help identify performance anomalies through a case study.","PeriodicalId":216113,"journal":{"name":"Annual ACM Workshop on Mining Network Data","volume":"283 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-06-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123679357","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 39
Comparison of anomaly signal quality in common detection metrics 常用检测指标中异常信号质量的比较
Pub Date : 2007-06-12 DOI: 10.1145/1269880.1269884
D. Brauckhoff, M. May, B. Plattner
Problems involving classification and pattern recognition can often be profitably viewed from the perspective of signal detection theory. We present ANEX (ANomaly EXposure), a simple and intuitive measure for comparing anomaly detection metrics regarding their capability to expose certain types of anomalies. ANEX is based on signal detection theory and determines the anomaly signal quality with the help of the intersection area of the metric's probability density functions in the normal and anomalous case. We illustrate the applicability of our measure by comparing 15 frequently-used detection metrics for the Blaster worm and discuss some early results by comparing NetFlow data from four different border gateway routers of a medium-sized ISP network.
从信号检测理论的角度来看,涉及分类和模式识别的问题往往是有益的。我们提出了ANEX(异常暴露),这是一种简单而直观的度量方法,用于比较异常检测指标暴露某些类型异常的能力。ANEX基于信号检测理论,在正常和异常情况下,利用度量的概率密度函数的交点面积来确定异常信号的质量。我们通过比较15种常用的Blaster蠕虫检测指标来说明我们测量的适用性,并通过比较来自中型ISP网络的四个不同边界网关路由器的NetFlow数据来讨论一些早期结果。
{"title":"Comparison of anomaly signal quality in common detection metrics","authors":"D. Brauckhoff, M. May, B. Plattner","doi":"10.1145/1269880.1269884","DOIUrl":"https://doi.org/10.1145/1269880.1269884","url":null,"abstract":"Problems involving classification and pattern recognition can often be profitably viewed from the perspective of signal detection theory. We present ANEX (ANomaly EXposure), a simple and intuitive measure for comparing anomaly detection metrics regarding their capability to expose certain types of anomalies. ANEX is based on signal detection theory and determines the anomaly signal quality with the help of the intersection area of the metric's probability density functions in the normal and anomalous case. We illustrate the applicability of our measure by comparing 15 frequently-used detection metrics for the Blaster worm and discuss some early results by comparing NetFlow data from four different border gateway routers of a medium-sized ISP network.","PeriodicalId":216113,"journal":{"name":"Annual ACM Workshop on Mining Network Data","volume":"58 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-06-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127477987","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Identifying and tracking suspicious activities through IP gray space analysis 通过IP灰空间分析识别和跟踪可疑活动
Pub Date : 2007-06-12 DOI: 10.1145/1269880.1269883
Yu Jin, Zhi-Li Zhang, Kuai Xu, Feng Cao, S. Sahu
Campus or enterprise networks often have many unassigned IP addresses that collectively form IP gray space within the address blocks of such networks. Using one-month traffic data collected in a large campus network, we have monitored a significant amount of unwanted traffic towards IP gray space in various forms, such as worms, port scanning, and denial of service attacks. In this paper, we apply a heuristic algorithm to extract the IP gray space in our campus network. Subsequently, we analyze the behavioral patterns such as dominant activities and target randomness, of the gray space traffic for individual outside hosts. By correlating and contrasting the traffic towards IP gray addresses and live end hosts, we find the gray space traffic provides unique insight for uncovering the behavior, and intention,of anomalous traffic towards live end hosts. Finally, we demonstrate the applications of gray space traffic for identifying SPAM behavior, detecting malicious scanning and worm activities that successfully compromise end hosts.
校园或企业网络通常有许多未分配的IP地址,这些地址在这些网络的地址块中共同形成IP灰空间。利用在大型校园网中收集的一个月的流量数据,我们监测了大量以各种形式(如蠕虫、端口扫描和拒绝服务攻击)流向IP灰色空间的无用流量。本文采用启发式算法提取校园网中的IP灰空间。随后,我们分析了灰空间流量在单个外部主机上的主导活动和目标随机性等行为模式。通过关联和对比流向IP灰色地址和活端主机的流量,我们发现灰色空间流量为揭示流向活端主机的异常流量的行为和意图提供了独特的见解。最后,我们演示了灰空间流量在识别垃圾邮件行为、检测恶意扫描和蠕虫活动方面的应用,这些活动成功地危害了终端主机。
{"title":"Identifying and tracking suspicious activities through IP gray space analysis","authors":"Yu Jin, Zhi-Li Zhang, Kuai Xu, Feng Cao, S. Sahu","doi":"10.1145/1269880.1269883","DOIUrl":"https://doi.org/10.1145/1269880.1269883","url":null,"abstract":"Campus or enterprise networks often have many unassigned IP addresses that collectively form IP gray space within the address blocks of such networks. Using one-month traffic data collected in a large campus network, we have monitored a significant amount of unwanted traffic towards IP gray space in various forms, such as worms, port scanning, and denial of service attacks. In this paper, we apply a heuristic algorithm to extract the IP gray space in our campus network. Subsequently, we analyze the behavioral patterns such as dominant activities and target randomness, of the gray space traffic for individual outside hosts. By correlating and contrasting the traffic towards IP gray addresses and live end hosts, we find the gray space traffic provides unique insight for uncovering the behavior, and intention,of anomalous traffic towards live end hosts. Finally, we demonstrate the applications of gray space traffic for identifying SPAM behavior, detecting malicious scanning and worm activities that successfully compromise end hosts.","PeriodicalId":216113,"journal":{"name":"Annual ACM Workshop on Mining Network Data","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-06-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129851749","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 23
Real-time monitoring of SIP infrastructure using message classification 使用消息分类对SIP基础设施进行实时监控
Pub Date : 2007-06-12 DOI: 10.1145/1269880.1269892
A. Acharya, Xiping Wang, Charles P. Wright, N. Banerjee, Bikram Sengupta
Session Initiation Protocol (SIP) is a control-plane protocol for multiple services such as VoIP, Instant Messaging and Presence, and in addition, is key to IP Multimedia Subsystem (IMS). A SIP message consists of plain-text headers and their corresponding values, which are used to route the message between one or more endpoints, resulting in a media session. These headers and values are often transformed/re-written at intermediate SIP servers ("proxies"). It is important to monitor the flow and transformation of such messages in real-time, for functional testing of a SIP overlay network containing malfunctioning or ill-configured SIP entities, or for efficient run-time SIP network operation, including problem determination and load balancing. Towards that end, we have designed and implemented a programmable in-kernel Linux SIP message classification engine. The classifier can be configured to intercept incoming and outgoing SIP messages from a server, extract appropriate message meta-data including distinguishing header-value pairs and their transformations, and forward the same to a monitoring engine. The engine collates this information from different classifiers across the network, to infer the state of a SIP call on individual servers on the call path as well as aggregated call-state.
SIP (Session Initiation Protocol)是一种用于VoIP、即时消息和在线状态等多种业务的控制平面协议,是IP多媒体子系统(IMS)的关键。SIP消息由纯文本报头及其相应的值组成,用于在一个或多个端点之间路由消息,从而产生媒体会话。这些报头和值通常在中间SIP服务器(“代理”)上进行转换/重写。实时监控这些消息的流和转换,对于包含故障或配置错误的SIP实体的SIP覆盖网络的功能测试,或者对于有效的运行时SIP网络操作,包括问题确定和负载平衡,都是非常重要的。为此,我们设计并实现了一个可编程的内核内Linux SIP消息分类引擎。可以将分类器配置为拦截来自服务器的传入和传出SIP消息,提取适当的消息元数据(包括区分报头值对及其转换),并将其转发给监视引擎。引擎整理来自网络上不同分类器的信息,以推断调用路径上各个服务器上的SIP调用状态以及聚合的调用状态。
{"title":"Real-time monitoring of SIP infrastructure using message classification","authors":"A. Acharya, Xiping Wang, Charles P. Wright, N. Banerjee, Bikram Sengupta","doi":"10.1145/1269880.1269892","DOIUrl":"https://doi.org/10.1145/1269880.1269892","url":null,"abstract":"Session Initiation Protocol (SIP) is a control-plane protocol for multiple services such as VoIP, Instant Messaging and Presence, and in addition, is key to IP Multimedia Subsystem (IMS). A SIP message consists of plain-text headers and their corresponding values, which are used to route the message between one or more endpoints, resulting in a media session. These headers and values are often transformed/re-written at intermediate SIP servers (\"proxies\"). It is important to monitor the flow and transformation of such messages in real-time, for functional testing of a SIP overlay network containing malfunctioning or ill-configured SIP entities, or for efficient run-time SIP network operation, including problem determination and load balancing. Towards that end, we have designed and implemented a programmable in-kernel Linux SIP message classification engine. The classifier can be configured to intercept incoming and outgoing SIP messages from a server, extract appropriate message meta-data including distinguishing header-value pairs and their transformations, and forward the same to a monitoring engine. The engine collates this information from different classifiers across the network, to infer the state of a SIP call on individual servers on the call path as well as aggregated call-state.","PeriodicalId":216113,"journal":{"name":"Annual ACM Workshop on Mining Network Data","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-06-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114661564","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
A markovian signature-based approach to IP traffic classification 基于马尔可夫签名的IP流分类方法
Pub Date : 2007-06-12 DOI: 10.1145/1269880.1269889
H. Dahmouni, Sandrine Vaton, D. Rossé
In this paper we present a real-time automatic process to traffic classification and to the detection of abnormal behaviors in IP traffic. The proposed method aims to detect anomalies in the traffic associated to a particular service, or to automatically recognize the service associated to a given sequence of packets at the transport layer. Service classification is becoming a central issue because of the emergence of new services (P2P, VoIP, Streaming video, etc...) which raises new challenges in resource reservation, pricing, network monitoring, etc... In order to identify a specific signature to an application, we first of all model the sequence of its packets at the transport layer by means of a first order Markov chain. Then, we decide which service should be associated to any new sequence by means of standard decision techniques (Maximum Likelihood criterion, Neyman-Pearson test). The evaluation of our automatic recognition procedure using live GPRS Orange France traffic traces demonstrates the feasibility and the excellent performance of this approach.
本文提出了一种实时自动的IP流量分类和异常行为检测方法。提出的方法旨在检测与特定服务相关的流量中的异常,或者在传输层自动识别与给定数据包序列相关的服务。由于新业务(P2P、VoIP、流媒体视频等)的出现,在资源预留、定价、网络监控等方面提出了新的挑战,服务分类正成为一个中心问题。为了识别应用程序的特定签名,我们首先通过一阶马尔可夫链在传输层对其数据包序列进行建模。然后,我们通过标准决策技术(最大似然准则,Neyman-Pearson检验)决定哪个服务应该与任何新序列相关联。我们的自动识别程序使用实时GPRS橙法国交通轨迹的评估证明了该方法的可行性和优异的性能。
{"title":"A markovian signature-based approach to IP traffic classification","authors":"H. Dahmouni, Sandrine Vaton, D. Rossé","doi":"10.1145/1269880.1269889","DOIUrl":"https://doi.org/10.1145/1269880.1269889","url":null,"abstract":"In this paper we present a real-time automatic process to traffic classification and to the detection of abnormal behaviors in IP traffic. The proposed method aims to detect anomalies in the traffic associated to a particular service, or to automatically recognize the service associated to a given sequence of packets at the transport layer. Service classification is becoming a central issue because of the emergence of new services (P2P, VoIP, Streaming video, etc...) which raises new challenges in resource reservation, pricing, network monitoring, etc... In order to identify a specific signature to an application, we first of all model the sequence of its packets at the transport layer by means of a first order Markov chain. Then, we decide which service should be associated to any new sequence by means of standard decision techniques (Maximum Likelihood criterion, Neyman-Pearson test). The evaluation of our automatic recognition procedure using live GPRS Orange France traffic traces demonstrates the feasibility and the excellent performance of this approach.","PeriodicalId":216113,"journal":{"name":"Annual ACM Workshop on Mining Network Data","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-06-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130116876","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 34
Authentication anomaly detection: a case study on a virtual private network 认证异常检测:以虚拟私网为例
Pub Date : 2007-06-12 DOI: 10.1145/1269880.1269886
M. Chapple, N. Chawla, A. Striegel
The authentication logs on a network can provide a trove of information for discovering potential anomalies in login attempts. Using such logs collected by a production Virtual Private Network device over a period of 15 months, we generate a diurnal model of network accesses. These models are used to detect anomalous authentications, which merit further investigation by a security analyst. We intend that this work will dramatically reduce the amount time spent by analysts identifying anomalous events and allow them to focus on in-depth analysis of these anomalies. Our work makes two contributions: a novel approach of mining authentication data, and the use of geographic distance as a metric to evaluate Virtual Private Network connections. We demonstrate the success of our model using real-world case analysis.
网络中的身份验证日志可以为发现网络中可能出现的异常行为提供大量信息。使用生产虚拟专用网设备在15个月期间收集的这些日志,我们生成了一个网络访问的日模型。这些模型用于检测异常身份验证,值得安全分析人员进一步调查。我们打算这项工作将大大减少分析人员识别异常事件所花费的时间,并允许他们专注于对这些异常进行深入分析。我们的工作有两个贡献:挖掘身份验证数据的新方法,以及使用地理距离作为评估虚拟专用网连接的度量。我们使用实际案例分析来证明我们模型的成功。
{"title":"Authentication anomaly detection: a case study on a virtual private network","authors":"M. Chapple, N. Chawla, A. Striegel","doi":"10.1145/1269880.1269886","DOIUrl":"https://doi.org/10.1145/1269880.1269886","url":null,"abstract":"The authentication logs on a network can provide a trove of information for discovering potential anomalies in login attempts. Using such logs collected by a production Virtual Private Network device over a period of 15 months, we generate a diurnal model of network accesses. These models are used to detect anomalous authentications, which merit further investigation by a security analyst. We intend that this work will dramatically reduce the amount time spent by analysts identifying anomalous events and allow them to focus on in-depth analysis of these anomalies. Our work makes two contributions: a novel approach of mining authentication data, and the use of geographic distance as a metric to evaluate Virtual Private Network connections. We demonstrate the success of our model using real-world case analysis.","PeriodicalId":216113,"journal":{"name":"Annual ACM Workshop on Mining Network Data","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-06-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117137787","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
Byte me: a case for byte accuracy in traffic classification 字节me:流量分类中字节准确性的一个案例
Pub Date : 2007-06-12 DOI: 10.1145/1269880.1269890
Jeffrey Erman, A. Mahanti, M. Arlitt
Numerous network traffic classification approaches have recently been proposed. In general, these approaches have focused on correctly identifying a high percentage of total flows. However, on the Internet a small number of "elephant" flows contribute a significant amount of the traffic volume. In addition, some application types like Peer-to-Peer (P2P) and FTP contribute more elephant flows than other applications types like Chat. In this opinion piece, we discuss how evaluating a classifier on flow accuracy alone can bias the classification results. By not giving special attention to these traffic classes and their elephant flows in the evaluation of traffic classification approaches we might obtain significantly different performance when these approaches are deployed in operational networks for typical traffic classification tasks such as traffic shaping. We argue that byte accuracy must also be used when evaluating the accuracy of traffic classification algorithms.
最近提出了许多网络流分类方法。一般来说,这些方法的重点是正确识别总流量的高比例。然而,在互联网上,少数“大象”流贡献了大量的流量。此外,一些应用程序类型(如P2P)和FTP比其他应用程序类型(如Chat)提供更多的大象流。在这篇观点文章中,我们讨论了如何仅根据流量准确性评估分类器会对分类结果产生偏差。如果在流量分类方法的评估中不特别关注这些流量类别及其象流,那么当这些方法部署在运营网络中用于典型的流量分类任务(如流量整形)时,我们可能会获得显着不同的性能。我们认为,在评估流量分类算法的准确性时,也必须使用字节精度。
{"title":"Byte me: a case for byte accuracy in traffic classification","authors":"Jeffrey Erman, A. Mahanti, M. Arlitt","doi":"10.1145/1269880.1269890","DOIUrl":"https://doi.org/10.1145/1269880.1269890","url":null,"abstract":"Numerous network traffic classification approaches have recently been proposed. In general, these approaches have focused on correctly identifying a high percentage of total flows. However, on the Internet a small number of \"elephant\" flows contribute a significant amount of the traffic volume. In addition, some application types like Peer-to-Peer (P2P) and FTP contribute more elephant flows than other applications types like Chat. In this opinion piece, we discuss how evaluating a classifier on flow accuracy alone can bias the classification results. By not giving special attention to these traffic classes and their elephant flows in the evaluation of traffic classification approaches we might obtain significantly different performance when these approaches are deployed in operational networks for typical traffic classification tasks such as traffic shaping. We argue that byte accuracy must also be used when evaluating the accuracy of traffic classification algorithms.","PeriodicalId":216113,"journal":{"name":"Annual ACM Workshop on Mining Network Data","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-06-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134131969","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 61
A three-tier IDS via data mining approach 通过数据挖掘方法的三层IDS
Pub Date : 2007-06-12 DOI: 10.1145/1269880.1269882
Tsong Song Hwang, Tsung-Ju Lee, Yuh-Jye Lee
We introduced a three-tier architecture of intrusion detection system which consists of a blacklist, a whitelist and a multi-class support vector machine classifier. The first tier is the blacklist that will filter out the known attacks from the traffic and the whitelist identifies the normal traffics. The rest traffics, the anomalies detected by the whitelist, were then be classified by a multi-class SVM classifier into four categories: PROBE, DoS, R2L and U2R. Many data mining and machine learning techniques were applied here. We design this three-tier IDS based on the KDD'99 benchmark dataset. Our system has 94.71% intrusion detection rate and 93.52% diagnosis rate. The averag cost for each connection is 0.1781. All of these results are better than those of KDD'99 winner's. Our three-tier architecture design also provides the flexibility for the practical usage. The network system administrator can add the new patterns into the blacklist and allows to do fine tuning of the whitelist according to the environment of their network system and security policy.
介绍了一种由黑名单、白名单和多类支持向量机分类器组成的三层入侵检测系统结构。第一层是黑名单,用于过滤已知的攻击,白名单用于识别正常的流量。然后利用多类SVM分类器将白名单检测到的异常流量分为PROBE、DoS、R2L和U2R四类。这里应用了许多数据挖掘和机器学习技术。我们基于KDD'99基准数据集设计了这个三层IDS。系统的入侵检测率为94.71%,诊断率为93.52%。每个连接的平均成本为0.1781。这些结果均优于KDD'99优胜者的结果。我们的三层架构设计也为实际使用提供了灵活性。网络系统管理员可以将新模式添加到黑名单中,并允许根据其网络系统环境和安全策略对白名单进行微调。
{"title":"A three-tier IDS via data mining approach","authors":"Tsong Song Hwang, Tsung-Ju Lee, Yuh-Jye Lee","doi":"10.1145/1269880.1269882","DOIUrl":"https://doi.org/10.1145/1269880.1269882","url":null,"abstract":"We introduced a three-tier architecture of intrusion detection system which consists of a blacklist, a whitelist and a multi-class support vector machine classifier. The first tier is the blacklist that will filter out the known attacks from the traffic and the whitelist identifies the normal traffics. The rest traffics, the anomalies detected by the whitelist, were then be classified by a multi-class SVM classifier into four categories: PROBE, DoS, R2L and U2R. Many data mining and machine learning techniques were applied here. We design this three-tier IDS based on the KDD'99 benchmark dataset. Our system has 94.71% intrusion detection rate and 93.52% diagnosis rate. The averag cost for each connection is 0.1781. All of these results are better than those of KDD'99 winner's. Our three-tier architecture design also provides the flexibility for the practical usage. The network system administrator can add the new patterns into the blacklist and allows to do fine tuning of the whitelist according to the environment of their network system and security policy.","PeriodicalId":216113,"journal":{"name":"Annual ACM Workshop on Mining Network Data","volume":"106 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-06-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134010034","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 50
Minerals: using data mining to detect router misconfigurations 矿物质:使用数据挖掘来检测路由器的错误配置
Pub Date : 2006-09-11 DOI: 10.1145/1162678.1162681
Franck Le, Sihyung Lee, Tina Wong, Hyong S. Kim, Darrell Newcomb
Recent studies have shown that router misconfigurations are common and have dramatic consequences for the operations of networks. Not only can misconfigurations compromise the security of a single network, they can even cause global disruptions in Internet connectivity. Several solutions have been proposed that can detect a number of problems in real configuration files. However, these solutions share a common limitation: they are rule-based. Rules are assumed to be known beforehand, and violations of these rules are deemed misconfigurations. As policies typically differ among networks, rule-based approaches are limited in the scope of mistakes they can detect. In this paper, we address the problem of router misconfigurations using data mining. We apply association rules mining to the configuration files of routers across an administrative domain to discover local, network-specific policies. Deviations from these local policies are potential misconfigurations. We have evaluated our scheme on configuration files from a large state-wide network provider, a large university campus and a high-performance research network, and found promising results. We discovered a number of errors that were confirmed and later corrected by the network engineers. These errors would have been difficult to detect with current rule-based approaches.
最近的研究表明,路由器配置错误是常见的,并对网络的运行产生了严重的后果。错误的配置不仅会危及单个网络的安全性,甚至还会导致全球Internet连接中断。已经提出了几种解决方案,可以检测实际配置文件中的许多问题。然而,这些解决方案有一个共同的限制:它们是基于规则的。规则被认为是事先已知的,违反这些规则被视为配置错误。由于网络之间的策略通常不同,基于规则的方法可以检测到的错误范围有限。在本文中,我们使用数据挖掘来解决路由器错误配置的问题。我们将关联规则挖掘应用于跨管理域的路由器配置文件,以发现本地的、特定于网络的策略。偏离这些本地策略是潜在的错误配置。我们在一个大型全国性网络提供商、一个大型大学校园和一个高性能研究网络的配置文件上对我们的方案进行了评估,并发现了有希望的结果。我们发现了一些错误,这些错误后来得到了网络工程师的确认和纠正。使用当前基于规则的方法很难检测到这些错误。
{"title":"Minerals: using data mining to detect router misconfigurations","authors":"Franck Le, Sihyung Lee, Tina Wong, Hyong S. Kim, Darrell Newcomb","doi":"10.1145/1162678.1162681","DOIUrl":"https://doi.org/10.1145/1162678.1162681","url":null,"abstract":"Recent studies have shown that router misconfigurations are common and have dramatic consequences for the operations of networks. Not only can misconfigurations compromise the security of a single network, they can even cause global disruptions in Internet connectivity. Several solutions have been proposed that can detect a number of problems in real configuration files. However, these solutions share a common limitation: they are rule-based. Rules are assumed to be known beforehand, and violations of these rules are deemed misconfigurations. As policies typically differ among networks, rule-based approaches are limited in the scope of mistakes they can detect. In this paper, we address the problem of router misconfigurations using data mining. We apply association rules mining to the configuration files of routers across an administrative domain to discover local, network-specific policies. Deviations from these local policies are potential misconfigurations. We have evaluated our scheme on configuration files from a large state-wide network provider, a large university campus and a high-performance research network, and found promising results. We discovered a number of errors that were confirmed and later corrected by the network engineers. These errors would have been difficult to detect with current rule-based approaches.","PeriodicalId":216113,"journal":{"name":"Annual ACM Workshop on Mining Network Data","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-09-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125633652","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
期刊
Annual ACM Workshop on Mining Network Data
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1