Similarity as a central approach to flow-based anomaly detection
Authors | |
---|---|
Year of publication | 2014 |
Type | Article in Periodical |
Magazine / Source | International Journal of Network Management |
MU Faculty or unit | |
Citation | |
Web | http://dx.doi.org/10.1002/nem.1867 |
Doi | http://dx.doi.org/10.1002/nem.1867 |
Field | Informatics |
Keywords | similarity; anomaly detection; network flows |
Description | Network flow monitoring is currently a common practice in mid and large-size networks. Methods of flow-based anomaly detection are subject to ongoing extensive research, because detection methods based on deep packet inspection have reached their limits. However, there is a lack of comprehensive studies mapping the state of the art in this area. For this reason, we have conducted a thorough survey of flow-based anomaly detection methods published on academic conferences and used by the industry. We have analyzed these methods using the perspective of similarity which is inherent to any anomaly detection method. Based on this analysis, we have proposed a new taxonomy of network anomalies and a similarity-oriented classification of flow-based detection methods. We have also identified four issues requiring further research: the lack of flow-based evaluation data sets, infeasible benchmarking of proposed methods, excessive false positive rate, and limited coverage of certain anomaly classes. |