Abstract
This article presents a new approach for detecting anomalies in the computer network. The approach is based on the determination of the network traffic statistical parameters in case of normal condition. When network anomaly happens, usually more than one statistical parameter is change. A set of parameters that have changed can be used to identify threats. Currently, anomaly detection mechanisms used in the network traffic are computationally complex and cannot be used in case of high speed connection. The presented method does not guarantee the anomaly identification but can be used as one of the indicators used for the isolation of suspicious flows (through ongoing modifications the routing or switching rules). Separated flow is subjected to further analysis with use of classical methods for anomaly detection. With this approach it is possible to make a rough anomaly identification in the core of high speed computer network.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
García-Teodoro P, Díaz-Verdejo J, Maciá-Fernández G, Vázquez E (2009) Anomaly-based network intrusion detection: techniques, systems and challenges. Comput Sec 28(1–2):18–28
Kumaravel A, Niraisha M (2013) Multi-classification approach for detecting network attacks. In: Conference on information and communication technologies, IEEE, (ICT 2013)
Lee G (2012) The challenges of securing the virtualized environment. IEEE Comput 45(1):17–20
Animesh P, Jung-Min P (2007) An overview of anomaly detection techniques: existing solutions and latest technological trends. Elsevier Comput Net 51:3448–3470
Sastry C, Rawat S, Pujari A (2007) Network traffic analysis using singular value decomposition and multiscale transforms. Inf Sci 177(23):5275–5291
Han W, Xiong W, Xiao Y et al (2012) A class of non-statistical traffic anomaly detection in complex network systems. In: 32nd International conference on distributed computing systems(ICDCSW), pp 640–646, IEEE
Xiong W, Xiong N, Yang Let al (2013) An anomaly-based detection in ubiquitous network using the equilibrium state of the catastrophe theory. J Supercomputing Springer 64(2):274–294
Lemes Proença M, Coppelmans C, Bottoli M, Alberti A (2004) The hurst parameter for digital signature of network segment. Telecommunications and networking—ICT 2004 Springer, Berlin, pp 772–781
Grabowski F (2011) Thermodynamic equilibrium of heterogeneous and distributed components of complex system as basis of effective control and management. In: 4th International conference on advanced computer theory and engineering (ICACTE 2011), pp 461–463
Palmieri F (2010) Network anomaly detection through nonlinear analysis. Comput Secur 29:737–755
Callegari C, Vaton S, Pagano M (2008) A New statistical approach to network anomaly, performance evaluation of computer and telecommunication systems, 2008. SPECTS, pp 205–211
Sobczyk M (2006) Statystyka aspekty praktyczne i teoretyczne. Wydawnictwo Uniwersytetu Marii Curie Skłodowskiej
Wroński M (2011) Wybrane narzędzia statystyki nieekstensywnej. Master Thesis,, FE&CE Rzeszow University of Technolog
Buda A, Jarynowski Z (2010) Life-time of correlations and its applications. Wydawnictwo Niezależne
Grzech A (2008) Optimization of two-level topological structure of distributed, intrusion detection system. Syst Eng ICSENG ‘08:337–342
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2015 Springer International Publishing Switzerland
About this paper
Cite this paper
Bolanowski, M., Paszkiewicz, A. (2015). The Use of Statistical Signatures to Detect Anomalies in Computer Network. In: Gołębiowski, L., Mazur, D. (eds) Analysis and Simulation of Electrical and Computer Systems. Lecture Notes in Electrical Engineering, vol 324. Springer, Cham. https://doi.org/10.1007/978-3-319-11248-0_19
Download citation
DOI: https://doi.org/10.1007/978-3-319-11248-0_19
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-11247-3
Online ISBN: 978-3-319-11248-0
eBook Packages: EngineeringEngineering (R0)