Skip to main content

Sampling-Based Stream Mining for Network Risk Management

  • Conference paper
  • First Online:
New Frontiers in Artificial Intelligence (JSAI 2006)

Part of the book series: Lecture Notes in Computer Science ((LNAI,volume 4384))

Included in the following conference series:

Abstract

Network security is an important issue in maintaining the Internet as an important social infrastructure. Especially, finding excessive consumption of network bandwidth caused by P2P mass flow, finding internet viruses, and finding DDoS attacks are important security issues. Although stream mining techniques seem to be promising techniques for network security, extensive network flow prevents the simple application of such techniques. Since conventional methods require non-realistic memory resources, a mining technique which works well using limited memory is required. This paper proposes a sampling-based mining method to achieve network security. By analyzing the characteristics of the proposed method with real Internet backbone flow data, we show the advantages of the proposed method, i.e. less memory consumption.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. http://www.caida.org/

  2. http://www.wide.ad.jp/wg/mawi/

  3. http://moat.nlanr.net/

  4. Rfc2330, framework for ip performance metrics

    Google Scholar 

  5. http://www.advanced.org/surveyor/

  6. Mirkovic, J., Prier, G., Reiher, P.L.: Attacking ddos at the source. In: Proc. of the 10th IEEE International Conference on Network Protocols, pp. 312–321. IEEE Computer Society Press, Los Alamitos (2002)

    Google Scholar 

  7. Ohsita, Y., Ata, S., Murata, M., Murase, T.: Detecting distributed denial-of-service attacks by analyzing tcp syn packets statistically. In: Proc. of IEEE Globecom 2004, IEEE Computer Society Press, Los Alamitos (2004)

    Google Scholar 

  8. Demaine, E.D., Lopez-Ortiz, A., Munro, J.I.: Frequency estimation of internet packet streams with limited space. In: Möhring, R.H., Raman, R. (eds.) ESA 2002. LNCS, vol. 2461, Springer, Heidelberg (2002)

    Google Scholar 

  9. Fang, M., Shivakumar, N., Garcia-Molina, H., Motwani, R., Ullman, J.D.: Computing iceberg queries efficiently. In: Proc. 24th Int. Conf. Very Large Data Bases, VLDB, pp. 299–310 (1998)

    Google Scholar 

  10. Manku, G., Motwani, R.: Approximate frequency counts over data streams. In: Proc. of the 28th International Conference on Very Large Data Bases, Hong Kong, China, pp. 346–357 (2002)

    Google Scholar 

  11. Charikar, M., Chen, K., Farach-Colton, M.: Finding frequent items in data streams (2002)

    Google Scholar 

  12. Jin, C., Qian, W., Sha, C., Yu, J.X., Zhou, A.: Dynamically maintaining frequent items over a data stream. In: Proc. of the twelfth international conference on Information and knowledge management, pp. 287–294 (2003)

    Google Scholar 

  13. Cormode, G., Muthukrishnan, S.: What’s hot and what’s not: Tracking frequent items dynamically. In: Proc. of Principles of Database Systems, pp. 296–306 (2003)

    Google Scholar 

  14. http://fimi.cs.helsinki.fi/

  15. http://sunsite.informatik.rwth-aachen.de/publications/ceur-ws//vol-126/

  16. Golab, L., DeHaan, D., Demaine, E., Lopez-Ortiz, A., Munro, J.I.: Identifying frequent items in sliding windows over on-line packet streams. In: Proc. of ACM SIGCOMM Internet Measurement Conference, Miami, USA, ACM Press, New York (2003)

    Google Scholar 

  17. http://fuzzy.cs.uni-magdeburg.de/~borgelt/apriori.html

Download references

Author information

Authors and Affiliations

Authors

Editor information

Takashi Washio Ken Satoh Hideaki Takeda Akihiro Inokuchi

Rights and permissions

Reprints and permissions

Copyright information

© 2007 Springer Berlin Heidelberg

About this paper

Cite this paper

Yoshida, K. (2007). Sampling-Based Stream Mining for Network Risk Management. In: Washio, T., Satoh, K., Takeda, H., Inokuchi, A. (eds) New Frontiers in Artificial Intelligence. JSAI 2006. Lecture Notes in Computer Science(), vol 4384. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-69902-6_32

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-69902-6_32

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-69901-9

  • Online ISBN: 978-3-540-69902-6

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics