Skip to main content

Performance Analysis of Network Anomaly Detection Systems in Consumer Networks

  • Conference paper
  • First Online:
  • 535 Accesses

Part of the book series: Lecture Notes in Networks and Systems ((LNNS,volume 127))

Abstract

There has been a significant increase in the amount of smart home appliances such as intelligent thermostats, Internet-connected baby monitors, lights being used; these devices have been a target for a number of cyber-attacks till date. Using only fundamental network information such as source and destination ports, packet sizes, TCP flags, time between subsequent packets, necessary features can be extracted to detect the aforementioned anomalies. This paper aims to analyze some critical operating system performance metrics on detecting such anomalies. It also consists of the taxonomy of various approaches to classify anomalies and detailed description on capturing and cleaning network packets.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   129.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. Doshi R, Apthorpe N, Feamster N (2018) Machine learning ddos detection for consumer internet of things devices. CoRR abs/1804.04159. http://arxiv.org/abs/1804.04159

  2. Kolias C, Kambourakis G, Stavrou A, Voas J (2017) DDoS in the IoT: Mirai and other botnets. Computer. https://doi.org/10.1109/MC.2017.201

    Article  Google Scholar 

  3. Chandola V, Banerjee A, Kumar V (2009) Anomaly detection: a survey. ACM Compu Surv. https://doi.org/10.1145/1541880.1541882

    Article  Google Scholar 

  4. García-Teodoro P, Díaz-Verdejo J, Maciá-Fernández G, Vázquez E (2009) Anomaly-based network intrusion detection: techniques, systems and challenges. Comput Secur. https://doi.org/10.1016/j.cose.2008.08.003

    Article  Google Scholar 

  5. Patcha A, Park JM (2007) An overview of anomaly detection techniques: existing solutions and latest technological trends. Comput Networks. https://doi.org/10.1016/j.comnet.2007.02.001

    Article  Google Scholar 

  6. Lo CH, Ansari N (2013) Consumer: a novel hybrid intrusion detection system for distribution networks in smart grid. IEEE Trans Emerg Topics in Comput 1(1):33–44. https://doi.org/10.1109/tetc.2013.2274043

  7. Yu M (2012) A nonparametric adaptive cusum method and its application in network anomaly detection. Int J Adv Comput Technol. https://doi.org/10.4156/ijact.vol4.issue1.32

  8. Chan PK, Mahoney MV Arshad M (2003) A machine learning approach to anomaly detection. Department of Computer Sciences

    Google Scholar 

  9. Chhabra P, Scott C, Kolaczyk ED, Crovella M (2008) Distributed spatial anomaly detection. In: Proceedings of IEEE INFOCOM. https://doi.org/10.1109/INFOCOM.2007.232

  10. Lu W, Ghorbani AA (2009) Network anomaly detection based on wavelet analysis. Eurasip J Adv Signal Process. https://doi.org/10.1155/2009/837601

    Article  MATH  Google Scholar 

  11. Mahoney M, Chan P (2004) Learning rules for anomaly detection of hostile network traffic. https://doi.org/10.1109/icdm.2003.1250987

  12. Manikopoulos C, Papavassiliou S (2002) Network intrusion and fault detection: a statistical anomaly approach. IEEE Commun Mag. https://doi.org/10.1109/MCOM.2002.1039860

    Article  Google Scholar 

  13. Simmross-Wattenberg F, Asensio-Pérez JI, Casaseca-De-La-Higuera P, Martín-Fernandez M, Dimitriadis IA, Alberola-López C (2011) Anomaly detection in network traffic based on statistical inference and \(\alpha \)-stable modeling. IEEE Trans Depend Secur Comput. https://doi.org/10.1109/TDSC.2011.14

    Article  Google Scholar 

  14. Wang K, Stolfo SJ (2010) Anomalous payload-based network intrusion detection. https://doi.org/10.1007/978-3-540-30143-1_11

  15. Xiuyao S, Mingxi W, Jermaine C, Ranka S (2007) Conditional anomaly detection. IEEE Trans Knowl Data Eng. https://doi.org/10.1109/TKDE.2007.1009

    Article  Google Scholar 

  16. Zhang Z, Li J, Manikopoulos CN, Jorgenson J, Ucles J (2001) HIDE: a hierarchical network intrusion detection system using statistical preprocessing and neural network classification. In: Proceedings of IEEE workshop on information assurance and security

    Google Scholar 

  17. Creech G, Hu J (2013) Generation of a new IDS test dataset: time to retire the KDD collection. In: IEEE wireless communications and networking conference (WCNC 2013). https://doi.org/10.1109/WCNC.2013.6555301

  18. wireshark. https://www.wireshark.org/

  19. Netcap (https://githubcom/dreadl0ck/netcap)

    Google Scholar 

  20. matplotlib (https://matplotliborg)

    Google Scholar 

  21. pandas (https://pandaspydataorg)

    Google Scholar 

  22. scikit-learn (https://scikit-learnorg)

    Google Scholar 

  23. Mukerji A, Rothstein J (2012) Detecting anomalous network application be havor

    Google Scholar 

  24. Agrawal S, Agrawal J (2015) Survey on anomaly detection using data mining techniques. Procedia Comput Sci 60:708–713. https://doi.org/10.1016/j.procs.2015.08.220

  25. Bhuyan MH, Bhattacharyya DK, Kalita JK (2014) Network anomaly detection: methods, systems and tools. IEEE Commun Surv Tutor. https://doi.org/10.1109/SURV.2013.052213.00046

    Article  Google Scholar 

  26. Navaz ASS., Sangeetha V, Prabhadevi C (2013) Entropy based anomaly detection system to prevent ddos attacks in cloud. CoRR abs/1308.6745. http://arxiv.org/abs/1308.6745

  27. Arunraj, NS, Hable R, Fernandes M, Leidl K, Heigl M (2018) Comparison of supervised , semi-supervised and unsupervised learning methods in network intrusion detection system (NIDS ) application. Anwendungen Und Konzepte Der Wirtschaftsinformatik (AKWI)

    Google Scholar 

  28. Rassam MA, Maarof MA, Zainal A (2014) Adaptive and online data anomaly detection for wireless sensor systems. Knowl Based Syst 60:44–57. https://doi.org/10.1016/j.knosys.2014.01.003

  29. He X, Mourot G, Maquin D, Ragot J, Beauseroy P, Smolarz A, Grall-Maës E (2014) Multi-task learning with one-class SVM. Neurocomputing. https://doi.org/10.1016/j.neucom.2013.12.022

    Article  Google Scholar 

  30. Schreyer M, Sattarov T, Borth D, Dengel A, Reimer B (2017) Detection of anomalies in large scale accounting data using deep autoencoder networks. CoRR abs/1709.05254. http://arxiv.org/abs/1709.05254

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to P. Darsh .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2021 The Editor(s) (if applicable) and The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Darsh, P., Rahul, R. (2021). Performance Analysis of Network Anomaly Detection Systems in Consumer Networks. In: Tripathy, A., Sarkar, M., Sahoo, J., Li, KC., Chinara, S. (eds) Advances in Distributed Computing and Machine Learning. Lecture Notes in Networks and Systems, vol 127. Springer, Singapore. https://doi.org/10.1007/978-981-15-4218-3_21

Download citation

Publish with us

Policies and ethics