Autonomic diagnosis of anomalous network traffic.

Marnerides, Angelos and Pezaros, Dimitrios P. and Hutchison, David (2010) Autonomic diagnosis of anomalous network traffic. In: 11th IEEE WoWMoM Conference Autonomic and Opportunistic Communications Workshop 2010, 2010-06-14 - 2010-06-17.

[thumbnail of AOC2010.pdf]
PDF (AOC2010.pdf)

Download (377kB)


Network traffic abnormalities pose one of the greatest threats for networked environments. Autonomic communications offer a solution: it should be possible to design network mechanisms that behave adaptively and respond to any anomalous phenomenon that threatens normal network behaviour. In this paper we present the design of an adaptive anomaly detection component that has been built as part of an autonomic network system. We have implemented an entropy estimator to predict the onset of anomalous traffic behaviour within an autonomic resilience framework, and a Supervised Naïve Bayesian classifier which synergistically empower the core properties of self-adaptation, self-learning and self-protection for next generation networks. Being part of an always-on, automated measurement and control infrastructure, such mechanism enforces the adaptive system reaction to suboptimal network operation and its subsequent restoration, while requiring minimal static (re)configuration and operator intervention.

Item Type:
Contribution to Conference (Other)
Journal or Publication Title:
11th IEEE WoWMoM Conference Autonomic and Opportunistic Communications Workshop 2010
Additional Information:
"©2010 IEEE. Personal use of this material is permitted. However, permission to reprint/republish this material for advertising or promotional purposes or for creating new collective works for resale or redistribution to servers or lists, or to reuse any copyrighted component of this work in other works must be obtained from the IEEE." "This material is presented to ensure timely dissemination of scholarly and technical work. Copyright and all rights therein are retained by authors or by other copyright holders. All persons copying this information are expected to adhere to the terms and constraints invoked by each author's copyright. In most cases, these works may not be reposted without the explicit permission of the copyright holder."
Uncontrolled Keywords:
?? networkresilienceanaprojectqa75 electronic computers. computer science ??
ID Code:
Deposited By:
Deposited On:
30 Nov 2010 08:54
Last Modified:
19 Jul 2024 01:22