Skip to main content
Log in

Algorithm for Online Detection of Traffic Anomalies in High-Speed Enterprise Multiservice Communication Networks

  • Published:
Automatic Control and Computer Sciences Aims and scope Submit manuscript

Abstract

A real-time adaptive algorithm for detecting traffic anomalies in high-speed enterprise multiservice communication networks is proposed. The main results of its study are presented.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1.
Fig. 2.
Fig. 3.
Fig. 4.
Fig. 5.
Fig. 6.
Fig. 7.
Fig. 8.
Fig. 9.

Similar content being viewed by others

REFERENCES

  1. ITU-T: General Overview of NGN. Recommendation Y.2001, Geneva, 2004.

  2. ISO/IEC 27001:2005: Information Technology. Security Techniques. Information Security Management Systems. Requirements, 2005.

  3. ITU-T: Communications Quality of Service: A Framework and Definitions. Recommendation G.1000, 2001.

  4. Simonina, O.A., Models for calculating the QoS indicators in networks of the next generation, Cand. Sci. (Eng.) Dissertation, St. Petersburg: The Bonch-Bruevich St. Petersburg State Univ. of Telecommunications, 2005.

  5. Vasiliev, Y.S. and Zegzhda, P.D., and Zegzhda, D.P., Providing security for automated process control systems at hydropower engineering facilities, Therm. Eng., 2016, vol. 63, no. 13, pp. 948–956. https://doi.org/10.1134/S0040601516130073

    Article  Google Scholar 

  6. Zegzhda, D.P. and Pavlenko, E.Yu., Cyber-sustainability of software-defined networks based on situational management, Autom. Control Comput. Sci., 2018, vol. 52, no. 8, pp. 984–992. https://doi.org/10.3103/S0146411618080291

    Article  Google Scholar 

  7. Lavrova, E. and Zaitceva, P., and Zegzhda, P., Bio-inspired approach to self-regulation for industrial dynamic network infrastructure, CEUR Workshop Proc., Moscow, 2019, Moscow: CEUR Workshop Proceedings, pp. 34–39.

  8. Demidov, R.A., Zegzhda, P.D., and Kalinin, M.O., Threat analysis of cyber security in wireless adhoc networks using hybrid neural network model, Autom. Control Comput. Sci., 2018, vol. 52, no. 8, pp. 971–976.  https://doi.org/10.3103/S0146411618080084

    Article  Google Scholar 

  9. Gol’dshtein, B.S., Sokolov, G.G., and Yanovskii, G.G., Seti svyazi. Uchebnik dlya VUZov (Communication Networks: Handbook for Universities), St. Petersburg: BKhV, 2011.

  10. Pugachev, V.S., A generalization of the theory of conditionally optimal estimation and extrapolation, Dokl. Akad. Nauk SSSR, 1982, vol. 262, no. 3, pp. 535–538.

    MathSciNet  Google Scholar 

  11. Polyak, B.T. and Tsypkin, Ya.Z., Pseudo-gradient algorithms of adaptation and learning, Avtom. Telemekh., 1973, vol. 3, pp. 45–63.

    Google Scholar 

  12. Polyak, B.T. and Tsypkin, Ya.Z., Optimal pseudo-gradient algorithms of adaptation, Avtom. Telemekh., 1980, vol. 8, pp. 74–84.

    Google Scholar 

  13. Takagi, T. and Sugeno, M., Fuzzy identification of systems and its applications to modeling and control, IEEE Trans. Syst., Man, Cybern., 1985, vol. 15, no. 1, pp. 116–132. https://doi.org/10.1109/TSMC.1985.6313399

    Article  MATH  Google Scholar 

  14. Kalinin, M.O., Application of neuro-fuzzy reasoning for network scanning detection, Probl. Inf. Bezop. Komp’yut. Sist., 2019, no. 3, pp. 125–136.

  15. Ageev, S.A., Saenko, I.B., and Kotenko, I.V., Method and algorithms of anomaly detection in multiservice network traffic based on fuzzy logical inference, Inf.-Upr. Sist., 2018, no. 3, pp. 61–68. https://doi.org/10.15217/issn1684-8853.2018.3.61

  16. Pegat, A., Nechetkoe modelirovanie i upravlenie (Fuzzy Modeling and Control), Moscow: BINOM. Laboratoriya Znanii, 2013, 2nd ed.

  17. Ageev, S., Karetnikov, V., Ol’khovik, E., and Privalov, A., Adaptive method of detecting traffic anomalies in high-speed multi-service communication networks, E3S Web Conf., 2020, vol. 157, p. 04027. https://doi.org/10.1051/e3sconf/202015704027

Download references

Author information

Authors and Affiliations

Authors

Corresponding authors

Correspondence to V. V. Karetnikov or I. A. Sikarev.

Ethics declarations

The authors declare that they have no conflicts of interest.

Additional information

Translated by E. Oborin

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Ageev, S.A., Ageeva, N.S., Karetnikov, V.V. et al. Algorithm for Online Detection of Traffic Anomalies in High-Speed Enterprise Multiservice Communication Networks. Aut. Control Comp. Sci. 55, 1068–1079 (2021). https://doi.org/10.3103/S0146411621080022

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.3103/S0146411621080022

Keywords:

Navigation