Abstract
In this paper, we propose a distributed PCA-based method for detecting anomalies in the network traffic, which, by means of multi-party computation techniques, is also able to face the different privacy constraints that arise in a multi-domain network scenario, while preserving the same performance of the centralised implementation (with only a limited overhead).
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Callegari, C., et al.: A methodological overview on anomaly detection. In: Biersack, E., Callegari, C., Matijasevic, M. (eds.) Data Traffic Monitoring and Analysis. LNCS, vol. 7754, pp. 148–183. Springer, Heidelberg (2013)
Patcha, A., Park, J.: An overview of anomaly detection techniques: Existing solutions and latest technological trends. Computer Networks 51 (2007)
Lakhina, A.: Diagnosing network-wide traffic anomalies. In: ACM SIGCOMM, pp 219–230 (2004)
Lakhina, A., Crovella, M., Diot, C.: Mining anomalies using traffic feature. In: ACM SIGCOMM (2005)
Chatzigiannakis, V., Papavassiliou, S., Androulidakis, G.: Improving network anomaly detection effectiveness via an integrated multi-metric-multi-link (m\(^{\text{3 }}\)l) PCA-based approach. Security and Communication Networks 2(3), 289–304 (2009)
Callegari, C., Gazzarrini, L., Giordano, S., Pagano, M., Pepe, T.: A novel multi time-scales PCA-based anomaly detection system. In: 2010 International Symposium on Performance Evaluation of Computer and Telecommunication Systems (SPECTS) (2010)
Callegari, C., Gazzarrini, L., Giordano, S., Pagano, M., Pepe, T.: Improving PCA-based anomaly detection by using multiple time scale analysis and Kullback-Leibler divergence. International Journal of Communication Systems (2012) n/a-n/a
Callegari, C., Gazzarrini, L., Giordano, S., Pagano, M., Pepe, T.: A novel PCA-based network anomaly detection. In: ICC, pp. 1–5 (2011)
Liu, Y., Zhang, L., Guan, Y.: Sketch-based streaming PCA algorithm for network-wide traffic anomaly detection. In: Proceedings of International Conference on Distributed Computing Systems (2010)
Dusi, M., Vitale, C., Niccolini, S., Callegari, C.: Distributed PCA-based anomaly detection in telephone networks through legitimate-user profiling. In: ICC, pp. 1107–1112 (2012)
Zhang, P., Huang, X., Sun, X., Wang, H., Ma, Y.: Privacy-preserving anomaly detection across multi-domain networks. In: FSKD, pp. 1066–1070. IEEE (2012)
Cramer, Ronald: Introduction to Secure Computation. In: Damgård, Ivan Bjerre (ed.) Lectures on Data Security. LNCS, vol. 1561, pp. 16–62. Springer, Heidelberg (1999)
Karr, A.F., Lin, X., Reiter, J.P., Sanil, A.P.: Privacy-preserving analysis of vertically partitioned data using secure matrix products. Journal of Official Statistics 25(1), 125–138 (2009)
Schweller, R., Gupta, A., Parsons, E., Chen, Y.: Reversible sketches for efficient and accurate change detection over network data streams. In: Proceedings of the ACM SIGCOMM Conference on Internet Measurement, IMC 2004, pp. 207–212. ACM, New York (2004)
The Internet2 Network. http://www.internet2.edu/network/
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2015 Springer International Publishing Switzerland
About this paper
Cite this paper
Callegari, C., Giordano, S., Pagano, M. (2015). Enforcing Privacy in Distributed Multi-Domain Network Anomaly Detection. In: Qiu, M., Xu, S., Yung, M., Zhang, H. (eds) Network and System Security. NSS 2015. Lecture Notes in Computer Science(), vol 9408. Springer, Cham. https://doi.org/10.1007/978-3-319-25645-0_32
Download citation
DOI: https://doi.org/10.1007/978-3-319-25645-0_32
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-25644-3
Online ISBN: 978-3-319-25645-0
eBook Packages: Computer ScienceComputer Science (R0)