Skip to main content

The Use of Statistical Signatures to Detect Anomalies in Computer Network

  • Conference paper
  • First Online:
Analysis and Simulation of Electrical and Computer Systems

Part of the book series: Lecture Notes in Electrical Engineering ((LNEE,volume 324))

Abstract

This article presents a new approach for detecting anomalies in the computer network. The approach is based on the determination of the network traffic statistical parameters in case of normal condition. When network anomaly happens, usually more than one statistical parameter is change. A set of parameters that have changed can be used to identify threats. Currently, anomaly detection mechanisms used in the network traffic are computationally complex and cannot be used in case of high speed connection. The presented method does not guarantee the anomaly identification but can be used as one of the indicators used for the isolation of suspicious flows (through ongoing modifications the routing or switching rules). Separated flow is subjected to further analysis with use of classical methods for anomaly detection. With this approach it is possible to make a rough anomaly identification in the core of high speed computer network.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Hardcover Book
USD 219.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. García-Teodoro P, Díaz-Verdejo J, Maciá-Fernández G, Vázquez E (2009) Anomaly-based network intrusion detection: techniques, systems and challenges. Comput Sec 28(1–2):18–28

    Article  Google Scholar 

  2. Kumaravel A, Niraisha M (2013) Multi-classification approach for detecting network attacks. In: Conference on information and communication technologies, IEEE, (ICT 2013)

    Google Scholar 

  3. Lee G (2012) The challenges of securing the virtualized environment. IEEE Comput 45(1):17–20

    Article  Google Scholar 

  4. Animesh P, Jung-Min P (2007) An overview of anomaly detection techniques: existing solutions and latest technological trends. Elsevier Comput Net 51:3448–3470

    Article  Google Scholar 

  5. Sastry C, Rawat S, Pujari A (2007) Network traffic analysis using singular value decomposition and multiscale transforms. Inf Sci 177(23):5275–5291

    Article  MATH  Google Scholar 

  6. Han W, Xiong W, Xiao Y et al (2012) A class of non-statistical traffic anomaly detection in complex network systems. In: 32nd International conference on distributed computing systems(ICDCSW), pp 640–646, IEEE

    Google Scholar 

  7. Xiong W, Xiong N, Yang Let al (2013) An anomaly-based detection in ubiquitous network using the equilibrium state of the catastrophe theory. J Supercomputing Springer 64(2):274–294

    Google Scholar 

  8. Lemes Proença M, Coppelmans C, Bottoli M, Alberti A (2004) The hurst parameter for digital signature of network segment. Telecommunications and networking—ICT 2004 Springer, Berlin, pp 772–781

    Google Scholar 

  9. Grabowski F (2011) Thermodynamic equilibrium of heterogeneous and distributed components of complex system as basis of effective control and management. In: 4th International conference on advanced computer theory and engineering (ICACTE 2011), pp 461–463

    Google Scholar 

  10. Palmieri F (2010) Network anomaly detection through nonlinear analysis. Comput Secur 29:737–755

    Article  Google Scholar 

  11. Callegari C, Vaton S, Pagano M (2008) A New statistical approach to network anomaly, performance evaluation of computer and telecommunication systems, 2008. SPECTS, pp 205–211

    Google Scholar 

  12. Sobczyk M (2006) Statystyka aspekty praktyczne i teoretyczne. Wydawnictwo Uniwersytetu Marii Curie Skłodowskiej

    Google Scholar 

  13. Wroński M (2011) Wybrane narzędzia statystyki nieekstensywnej. Master Thesis,, FE&CE Rzeszow University of Technolog

    Google Scholar 

  14. Buda A, Jarynowski Z (2010) Life-time of correlations and its applications. Wydawnictwo Niezależne

    Google Scholar 

  15. Grzech A (2008) Optimization of two-level topological structure of distributed, intrusion detection system. Syst Eng ICSENG ‘08:337–342

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Marek Bolanowski .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2015 Springer International Publishing Switzerland

About this paper

Cite this paper

Bolanowski, M., Paszkiewicz, A. (2015). The Use of Statistical Signatures to Detect Anomalies in Computer Network. In: Gołębiowski, L., Mazur, D. (eds) Analysis and Simulation of Electrical and Computer Systems. Lecture Notes in Electrical Engineering, vol 324. Springer, Cham. https://doi.org/10.1007/978-3-319-11248-0_19

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-11248-0_19

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-11247-3

  • Online ISBN: 978-3-319-11248-0

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics