Affiliation:
1. University of Minnesota, Minneapolis, MN
2. Sprint ATL, Burlingame, CA
Abstract
Recent spates of cyber-attacks and frequent emergence of applications affecting Internet traffic dynamics have made it imperative to develop effective techniques that can extract, and make sense of, significant communication patterns from Internet traffic data for use in network operations and security management. In this paper, we present a general methodology for building comprehensive behavior profiles of Internet backbone traffic in terms of communication patterns of end-hosts and services. Relying on data mining and information-theoretic techniques, the methodology consists of significant cluster extraction, automatic behavior classification and structural modeling for in-depth interpretive analyses. We validate the methodology using data sets from the core of the Internet. The results demonstrate that it indeed can identify common traffic profiles as well as anomalous behavior patterns that are of interest to network operators and security analysts.
Publisher
Association for Computing Machinery (ACM)
Subject
Computer Networks and Communications,Software
Cited by
107 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. FIGRET: Fine-Grained Robustness-Enhanced Traffic Engineering;Proceedings of the ACM SIGCOMM 2024 Conference;2024-08-04
2. SToRM: Smart ticket resolution steps recommendation in facilities management;The Third International Conference on Artificial Intelligence and Machine Learning Systems;2023-10-25
3. Cyber resilience in industrial networks: A state of the art, challenges, and future directions;Journal of King Saud University - Computer and Information Sciences;2023-10
4. IP traffic behavior characterization via semantic mining;Journal of Network and Computer Applications;2023-04
5. Role-based lateral movement detection with unsupervised learning;Intelligent Systems with Applications;2022-11