Dynamic Group Behavior Analysis and Its Application in Network Abnormal Behavior Detection
Focus on the difficulty of large-scale network traffic monitoring and analysis, this paper proposed the concepts of Group Behavior Flow model to aggregate traffic packets and perform abnormal behavior detection. Based on the flow model the pivotal traffic metrics can be extracted while the number of flow records are reduced significantly. Secondly, we employ the graph model to capture the traffic feature distribution between different group users. And optical flow analysis methods are proposed to extract the dynamic behavior changing features between different groups and achieve the goal of abnormal behavior detection. The experimental results based on actual traffic traces show that the methods proposed in this paper can capture the traffic features effectually in the current 10 Gbps network environment, and achieve the goal of abnormal behavior detection and abnormal source location, which is very important for traffic management.
KeywordsGroup user model Dynamic behavior Optical flow analysis Abnormal detection
The research presented in this paper is supported in part by the Natural Science Foundation of China (61502438, 61672026), Natural Science Foundation of Shaanxi Province (2016JM6040), and Chinese Defense Advance Research Program (B0820132036).
- 1.Baldi, M., Baralis, E., Risso, F.: Data mining techniques for effective and scalable traffic analysis. In: IEEE International Symposium on Integrated Network Management, 15–19 May 2005, pp. 105–118 (2005)Google Scholar
- 2.Zhou, A., Guang, C., Guo, X.: High-speed network traffic measurement methods. J. Softw. 25(1), 135–153 (2014)Google Scholar
- 4.Wang, J., Rossell, D., Cassandras, C.G., et al.: Network anomaly detection: a survey and comparative analysis of stochastic and deterministic methods. In: Proceedings of the 52nd IEEE Conference on Decision and Control, Florence, Italy (2013)Google Scholar
- 5.CISCO NetFlow: Cisco systems, Inc. (2004). http://www.cisco.com/en/US/products/ps6601/products_white_paper09186a00800a3db9.shtml
- 6.Kim, S.S., Reddy, A.L.N.: A study of analyzing network traffic as images in real-time. In: 24th Annual Joint Conference of the IEEE Computer and Communications Societies, 13–17 March 2005, vol. 3, pp. 2056–2067 (2005)Google Scholar
- 7.Lakhina, A., Papagiannaki, K., Crovella, M., et al.: Structural analysis of network traffic flows. In: Proceedings of the Joint International Conference on Measurement and Modeling Of Computer Systems, pp. 61–72 (2004)Google Scholar
- 8.Freedman, M.J., Vutukuru, M., Feamster, N., et al.: Geographic locality of IP prefixes. In: Proceedings of the ACM Internet Measurement Conference Berkeley, CA, pp. 153–158, October 2005Google Scholar
- 9.Wang, X., Zhang, G.: Research on moving object detection method based on optical flow. J. Comput. Eng. Appl. 40(1), 43–46 (2004)Google Scholar