Skip to main content

Detection of traffic anomalies in multi-service networks based on a fuzzy logical inference

  • Conference paper
  • First Online:
Intelligent Distributed Computing X (IDC 2016)

Part of the book series: Studies in Computational Intelligence ((SCI,volume 678))

Included in the following conference series:

Abstract

Methods and algorithms for detection of traffic anomalies in multi-service networks play a key role in creating the malware intrusion detection and prevention systems in modern communication infrastructures. The major requirement imposed to such systems is the ability to find anomalies and, respectively, intrusions in real time. Complexity of this problem is caused in many ways by incompleteness, discrepancy and variety of distribution laws at streams in a multi-service traffic. The paper represents a new technique for traffic anomaly detection in multiservice networks. It is based on using modified adaptation algorithms without identification and fuzzy logical inference rules. Results of an experimental assessment of the technique are discussed.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 129.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 169.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Stanwyck, D.: Profitable Deploying Services in the Next Generation Network. In: Voice-in-the Net Japan, Tokyo, Key3Media (2002).

    Google Scholar 

  2. Kanáliková, A.: Services In Ngn – Next Generation Networks. In: Journal of Information, Control and Management Systems, Vol. 3, No. 2, pp.97-102 (2005).

    Google Scholar 

  3. Wood, R.: Next-Generation Network Services. Cisco Press, USA (2008).

    Google Scholar 

  4. Gorodetski, V., Kotenko, I., Karsaev, O.: Multi-agent technologies for computer network security: Attack simulation, intrusion detection and intrusion detection learning. In: International Journal of Computer Systems Science & Engineering, No.4, pp.191-200 (2003).

    Google Scholar 

  5. Kotenko, I., Saenko, I., Ageev, S.: Countermeasure Security Risks Management in the Internet of Things based on Fuzzy Logic Inference. In: The 14th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom-2015), pp.655-6598 (2015).

    Google Scholar 

  6. Paxson, V.: A System for Detecting Network Intruders in Real-Time. In: Proc. of the 7th USENIX Security Symposium, San Antonio, Texas, January 26-29 (1998).

    Google Scholar 

  7. Paxson, V.: A System for Detecting Network Intruders in Real-Time. In: Computers Networks, No.31, pp. 2435-2463 (1999).

    Google Scholar 

  8. Laskin, N., Lambadaries, I., Harmatzis, F.C., Devetsikiotis, M.: Fractional Levy motion and its application to network traffic modeling. In: Elsevier Comp. Network, Vol. 40, pp.363-375 (2002).

    Google Scholar 

  9. Dang, T.D.: New results in multifractal traffic analysis and modeling, Budapest (2002).

    Google Scholar 

  10. Ageev, S., Vasil’ev, K.: Adaptive Algorithms for Decorrelation to Image Processing. In: Pattern Recognition and Image Analysis, Vol.11, No.1, pp.131-134 (2001).

    Google Scholar 

  11. Takagi, T., Sugeno, M.: Fuzzy Identification of Systems and Its Applications to Modeling and Control. In: IEEE Trans. on System, Man and Cybernetics, Vol.15, No.1, pp.11-132 (1985).

    Google Scholar 

  12. Wang, H., Zhang, D., Shin, K.G.: Detecting syn flooding attacks. In: Proc. of IEEE INFOCOM (2002).

    Google Scholar 

  13. Staniford, S., Hoagland, J., MCalerney, J.M.: Practical automated detection of stealthy portscans. In: Proc. of the IDS Workshop of the 7th Computer and Communications Security Conference (2000).

    Google Scholar 

  14. Brutlag, J.D.: Aberrant behavior detection in time series for network service monitoring. In: Proc. of the 14th Systems Administration Conference, pp.139-146 (2000).

    Google Scholar 

  15. Thottan, M., Ji, C.: Anomaly detection in IP networks. In: IEEE Trans. Signal Processing, Vol.51 (2003).

    Google Scholar 

  16. Kotenko, I., Saenko, I., Ageev, S., Kopchak, Y.: Abnormal Traffic Detection in networks of the Internet of things based on fuzzy logical inference. In: Proc. of the XVIII International Conference on Soft Computing and Measurements (SCM’2015). IEEE Xplore, pp.5-8 (2015).

    Google Scholar 

  17. Spall, L.C. Introduction to Stochastic Search and Optimization: Estimation, Simulation and Control, John Wiley Hoboken, NJ (2003).

    Google Scholar 

  18. Polyak, B.T., Tsypkin, Ya.Z. Pseudogradient adaptation and learning algorithms. In: Automation and Remote Control, No. 3(34), pp.377-397 (1973).

    Google Scholar 

  19. Calafiore, G., Polyak, B.T., Stochastic algorithms for exact and approximate feasibility of robust LMIs. In: IEEE Trans. on Automatic Control, Vol.46, No.11, pp.1755-1759 (2001).

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Igor Kotenko .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2017 Springer International Publishing AG

About this paper

Cite this paper

Saenko, I., Ageev, S., Kotenko, I. (2017). Detection of traffic anomalies in multi-service networks based on a fuzzy logical inference. In: Badica, C., et al. Intelligent Distributed Computing X. IDC 2016. Studies in Computational Intelligence, vol 678. Springer, Cham. https://doi.org/10.1007/978-3-319-48829-5_8

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-48829-5_8

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-48828-8

  • Online ISBN: 978-3-319-48829-5

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics