Skip to main content

Analyzing and Visualizing Anomalies and Events in Time Series of Network Traffic

  • Conference paper
  • First Online:
Recent Advances in Information and Communication Technology 2019 (IC2IT 2019)

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 936))

Included in the following conference series:

  • 418 Accesses

Abstract

The traffic among the hosts and behaviors of the anomalous hosts in the network is usually complex. In network traffic, there is a key problem that is how to identify the security incidents. The corresponding question that who have contributed to the incidents is arisen then. A method, which detects both anomalies and events at the same time is quite helpful. A data from network traffic can be composed of the hosts and different attributes (traffic flow like amount of upload package and download package) in time series. Based on the structure of the network traffic data, we propose an anomaly and event detection method based on the network attributes in time series. The method analyzes both the host’s behavior and the temporal features of the network traffic.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 129.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Huang, H., Al-Azzawi, H., Brani, H.: Network traffic anomaly detection. Eprint Arxiv (2014)

    Google Scholar 

  2. Gupta, M., Gao, J., Aggarwal, C., Han, J.: Outlier detection for temporal data: a survey. IEEE Trans. Knowl. Data Eng. 26(9), 2250–2267 (2014)

    Article  Google Scholar 

  3. Ide, T., Kashima, H.: Eigenspace-based anomaly detection in computer systems. In: Proceedings of the 10th ACM SIGKDD, pp. 440–449, August 2004

    Google Scholar 

  4. Akoglu, L., Faloutsos, C.: Event detection in time series of mobile communication graphs. In: Proceedings of Army Science Conference, vol. 2 (2008)

    Google Scholar 

  5. Ahmed, M., Mahmood, A., Hu, J.: A survey of network anomaly detection techniques. J. Netw. Comput. Appl. 60, 19–31 (2015)

    Article  Google Scholar 

  6. Monowar, H., Bhuyan, D., Bhattacharyya, K., Kalita, J.: Network traffic anomaly detection: methods, systems and tools. IEEE Commun. Surv. Tutor. 16(1), 303–336 (2014)

    Article  Google Scholar 

  7. Lakhina, A., Crovella, M., Diot, C.: Diagnosing network-wide traffic anomalies. ACM Sigcomm Comput. Commun. Rev. 34(4), 219–230 (2004)

    Article  Google Scholar 

  8. Novakov, S., Lung, C., Lambadaris, I., Seddigh, N.: Combining statistical and spectral analysis techniques in network traffic anomaly detection. In: 2012 Next Generation Networks and Services, pp. 94–101 (2012)

    Google Scholar 

  9. Kaur, G., Saxena, V., Gupta, J.: A novel multi scale approach for detecting high bandwidth aggregates in network traffic. Int. J. Secur. Appl. 7(5), 81–100 (2013)

    Google Scholar 

  10. Kwon, D.W., Ko, K., Vannucci, M., Reddy, A.L.N., Kim, S.: Wavelet methods for the detection of anomalies and their application to network traffic analysis. Qual. Reliab. Eng. Int. 22(8), 953–969 (2006)

    Article  Google Scholar 

  11. Gao, J., Fan, W., Turaga, D., Verscheure, O.: Consensus extraction from heterogeneous detectors to improve performance over network traffic anomaly detection. In: Proceedings - IEEE INFOCOM, vol. 267, no. 2, pp. 181–185 (2011)

    Google Scholar 

  12. Mansman, F., Meier, L., Keim, D.A.: Visualization of host behavior for network security. In: VizSEC 2007, pp. 187–202 (2007)

    Google Scholar 

  13. Iglesias, F., Zseby, T.: Analysis of network traffic features for anomaly detection. Mach. Learn. 101, 59–84 (2015)

    Article  MathSciNet  Google Scholar 

  14. Br, B.: Multi-scale analysis and modeling using wavelets. J. Chemom. 13(3–4), 415–434 (1999)

    Google Scholar 

Download references

Acknowledgement

This work is partially supported by National Natural Science Foundation of China (Grant No. 61702372, No. 61672380) and The Fundamental Research Funds for the Central Universities of China.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Jiangfeng Li .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Zhao, Q., Zhang, Y., Shi, Y., Li, J. (2020). Analyzing and Visualizing Anomalies and Events in Time Series of Network Traffic. In: Boonyopakorn, P., Meesad, P., Sodsee, S., Unger, H. (eds) Recent Advances in Information and Communication Technology 2019. IC2IT 2019. Advances in Intelligent Systems and Computing, vol 936. Springer, Cham. https://doi.org/10.1007/978-3-030-19861-9_2

Download citation

Publish with us

Policies and ethics