Header menu link for other important links
X
Multi-level anomaly detection: Relevance of big data analytics in networks
, Saad Y. Sait, Akshay Bhandari, Shreya Khare
Published in Springer India
2015
Volume: 40
   
Issue: 6
Pages: 1737 - 1767
Abstract
The Internet has become a vital source of information; internal and external attacks threaten the integrity of the LAN connected to the Internet. In this work, several techniques have been described for detection of such threats. We have focussed on anomaly-based intrusion detection in the campus environment at the network edge. A campus LAN consisting of more than 9000 users with a 90 Mbps internet access link is a large network. Therefore, efficient techniques are required to handle such big data and to model user behaviour. Proxy server logs of a campus LAN and edge router traces have been used for anomalies like abusive Internet access, systematic downloading (internal threats) and DDoS attacks (external threat); our techniques involve machine learning and time series analysis applied at different layers in TCP/IP stack. Accuracy of our techniques has been demonstrated through extensive experimentation on huge and varied datasets. All the techniques are applicable at the edge and can be integrated into a Network Intrusion Detection System. © 2015, Indian Academy of Sciences.
About the journal
JournalData powered by TypesetSadhana - Academy Proceedings in Engineering Sciences
PublisherData powered by TypesetSpringer India
ISSN02562499
Open AccessYes
Concepts (20)
  •  related image
    Artificial intelligence
  •  related image
    Behavioral research
  •  related image
    Denial-of-service attack
  •  related image
    Harmonic analysis
  •  related image
    Internet
  •  related image
    Intrusion detection
  •  related image
    Learning systems
  •  related image
    Local area networks
  •  related image
    Mercury (metal)
  •  related image
    Signal detection
  •  related image
    Time series analysis
  •  related image
    Anomaly detection
  •  related image
    ANOMALY-BASED INTRUSION DETECTION
  •  related image
    Data analytics
  •  related image
    Different layers
  •  related image
    INTERNET ACCESS
  •  related image
    NETWORK INTRUSION DETECTION SYSTEMS
  •  related image
    One-class classification
  •  related image
    USER BEHAVIOUR
  •  related image
    Big data