Skip to main content

Application of Wavelet Packet Transform to Network Anomaly Detection

  • Conference paper
Next Generation Teletraffic and Wired/Wireless Advanced Networking (NEW2AN 2008)

Part of the book series: Lecture Notes in Computer Science ((LNCCN,volume 5174))

Included in the following conference series:

Abstract

In the last few years, the number and impact of security attacks over the Internet have been continuously increasing. Since it seems impossible to guarantee complete protection to a system by means of the “classical” prevention mechanisms, the use of Intrusion Detection Systems (IDSs) has emerged as a key element in network security. In this paper we address the problem considering different methods, based on the Wavelet Packet Transform, for detecting anomalies in the network traffic, taking into account both the best basis and the value of transformed coefficients.

The performance comparison among the different solutions shows that very little information about network anomalies is carried by the best basis selection, while the “distance” between the transformed coefficients leads to very interesting results, highlighting the effectiveness of the proposed approaches.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Barford, P., Kline, J., Plonka, D., Ron, A.: A signal analysis of network traffic anomalies. In: IMW 2002: Proceedings of the 2nd ACM SIGCOMM Workshop on Internet measurment, pp. 71–82 (2002)

    Google Scholar 

  2. Huang, P., Feldmann, A., Willinger, W.: A non-instrusive, wavelet-based approach to detecting network performance problems. In: IMW 2001: Proceedings of the 1st ACM SIGCOMM Workshop on Internet Measurement, pp. 213–227 (2001)

    Google Scholar 

  3. Dainotti, A., Pescapè, A., Ventre, G.: Wavelet-based detection of DoS attacks. In: Proceedings of GLOBECOM 2006, pp. 1–6 (2006)

    Google Scholar 

  4. Daubechies, I.: Ten lectures on Wavelets. CBMS-NSF Series in Applied Mathematics, vol. 61. SIAM, Philadelphia (1992)

    MATH  Google Scholar 

  5. Mallat, S.: Multifrequency channel decompositions of images and wavelet models. IEEE Transactions on Acoustics, Speech and Signal Processing 37, 2091–2110 (1989)

    Article  Google Scholar 

  6. Wickerhauser, M.: Lectures on wavelet packet algorithms, November 18 (1991)

    Google Scholar 

  7. Hess-Nielsen, N., Wickerhauser, M.: Wavelets and time-frequency analysis. In: Proceedings of the IEEE, vol. 84, pp. 523–540 (April 1996)

    Google Scholar 

  8. MIT, Lincoln laboratory, DARPA evaluation intrusion detection(accessed on December 12, 2008) (2008), http://www.ll.mit.edu/IST/ideval/

  9. Lippmann, R., Haines, J., Fried, D., Korba, J., Das, K.: The 1999 DARPA off-line intrusion detection evaluation. Computer Networks 34(4), 579–595 (2000)

    Article  Google Scholar 

  10. UCLA Data Traces, http://lever.cs.ucla.edu/ddos/traces

  11. CERT Coordination Center. Denial-of-service tools - advisory, 1999-17, http://www.cert.org/advisories/CA-1999-17.html

  12. CERT Coordination Center. DoS Developments - advisory ca-2000-01, http://www.cert.org/advisories/CA-2000-01.html

  13. Yuan, J., Mills, K.: Monitoring the macroscopic effect of DDoS flooding attacks. IEEE Trans. Dependable Secur. Comput. 2(4), 324–335 (2005)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Sergey Balandin Dmitri Moltchanov Yevgeni Koucheryavy

Rights and permissions

Reprints and permissions

Copyright information

© 2008 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Callegari, C., Giordano, S., Pagano, M. (2008). Application of Wavelet Packet Transform to Network Anomaly Detection. In: Balandin, S., Moltchanov, D., Koucheryavy, Y. (eds) Next Generation Teletraffic and Wired/Wireless Advanced Networking. NEW2AN 2008. Lecture Notes in Computer Science, vol 5174. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-85500-2_22

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-85500-2_22

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-85499-9

  • Online ISBN: 978-3-540-85500-2

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics