skip to main content
10.1145/1028788.1028813acmconferencesArticle/Chapter ViewAbstractPublication PagesimcConference Proceedingsconference-collections
Article

Characterization of network-wide anomalies in traffic flows

Published:25 October 2004Publication History

ABSTRACT

Detecting and understanding anomalies in IP networks is an open and ill-defined problem. Toward this end, we have recently proposed the subspace method for anomaly diagnosis. In this paper we present the first large-scale exploration of the power of the subspace method when applied to flow traffic. An important aspect of this approach is that it fuses information from flow measurements taken throughout a network. We apply the subspace method to three different types of sampled flow traffic in a large academic network: multivariate timeseries of byte counts, packet counts, and IP-flow counts. We show that each traffic type brings into focus a different set of anomalies via the subspace method. We illustrate and classify the set of anomalies detected. We find that almost all of the anomalies detected represent events of interest to network operators. Furthermore, the anomalies span a remarkably wide spectrum of event types, including denial of service attacks (single-source and distributed), flash crowds, port scanning, downstream traffic engineering, high-rate flows, worm propagation, and network outage.

References

  1. Abilene Network Operations Center Weekly Reports. At http://www.abilene.iu.edu/routages.cgi.Google ScholarGoogle Scholar
  2. S. Agarwal, C.-N. Chuah, S. Bhattacharyya, and C. Diot. The Impact of BGP Dynamics on Intra-Domain Traffic. In ACM SIGMETRICS, New York, June 2004. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. P. Barford, J. Kline, D. Plonka, and A. Ron. A Signal Analysis of Network Traffic Anomalies. In Internet Measurement Workshop, Marseille, November 2002. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. Cisco NetFlow. At www.cisco.com/warp/public/732/Tech/netflow/.Google ScholarGoogle Scholar
  5. Deloader Worm Description. At http://www.f-secure.com/v-descs/deloader.shtml.Google ScholarGoogle Scholar
  6. N. Duffield, C. Lund, and M. Thorup. Estimating Flow Distributions from Sampled Flow Statistics. In ACM SIGCOMM, Karlsruhe, August 2003. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. R. Dunia and S. J. Qin. Multi-dimensional Fault Diagnosis Using a Subspace Approach. In American Control Conference, 1997.Google ScholarGoogle Scholar
  8. A. Feldmann, A. Greenberg, C. Lund, N. Reingold, J. Rexford, and F. True. Deriving Traffic Demands for Operational IP networks: Methodology and Experience. In IEEE/ACM Transactions on Neworking, pages 265--279, June 2001. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. A. Hussain, J. Heidemann, and C. Papadopoulos. A Framework for Classifying Denial of Service Attacks. In ACM SIGCOMM, Karlsruhe, August 2003. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. J. Jung and B. Krishnamurthy and M. Rabinovich. Flash Crowds and Denial of Service Attacks: Characterization and Implications for CDNs and Web Sites. In World Wide Web Conference, Hawaii, May 2002. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. J. E. Jackson. A User's Guide to Principal Components. John Wiley, New York, NY, 1991.Google ScholarGoogle Scholar
  12. J. E. Jackson and G. S. Mudholkar. Control Procedures for Residuals Associated with Principal Component Analysis. Technometrics, pages 341--349, 1979.Google ScholarGoogle ScholarCross RefCross Ref
  13. Juniper Traffic Sampling. At www.juniper.net/techpubs/software/junos/junos60/swconfig60-policy/html/sampling overview.html.Google ScholarGoogle Scholar
  14. M.-S. Kim, H.-J. Kang, S.-C. Hung, S.-H. Chung, and J. W. Hong. A Flow-based Method for Abnormal Network Traffic Detection. In IEEE/IFIP Network Operations and Management Symposium, Seoul, April 2004.Google ScholarGoogle Scholar
  15. A. Lakhina, M. Crovella, and C. Diot. Characterization of Network-Wide Anomalies in Traffic Flows. Technical Report BUCS-2004-020, Boston University, 2004.Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. A. Lakhina, M. Crovella, and C. Diot. Diagnosing Network-Wide Traffic Anomalies. In ACM SIGCOMM, Portland, August 2004. Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. A. Lakhina, K. Papagiannaki, M. Crovella, C. Diot, E. D. Kolaczyk, and N. Taft. Structural Analysis of Network Traffic Flows. In ACM SIGMETRICS, New York, June 2004. Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. A. Markopoulou, G. Iannaccone, S. Bhattacharyya, C.-N. Chuah, and C. Diot. Characterization of Failures in an IP Backbone. In IEEE INFOCOM, Hong Kong, April 2004.Google ScholarGoogle ScholarCross RefCross Ref
  19. J. Mirkovic and P. Reiher. A Taxonomy of DDoS Attacks and Defense Mechanisms. ACM CCR, April 2004. Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. Pathdiag: Network Path Diagnostic Tools. At http://www.psc.edu/ web100/pathdiag/.Google ScholarGoogle Scholar
  21. S. Sarvotham, R. Riedi, and R. Baraniuk. Network Traffic Analysis and Modeling at the Connection Level. In Internet Measurement Workshop, San Francisco, November 2001.Google ScholarGoogle ScholarDigital LibraryDigital Library
  22. SLAC Internet End-to-end Performance Monitoring (IEPM-BW project). At http://www-iepm.slac.stanford.edu/bw/.Google ScholarGoogle Scholar
  23. R. Teixeira, A. Shaikh, T. Griffin, and J. Rexford. Dynamics of Hot-Potato Routing in IP Networks. In ACM SIGMETRICS, New York, June 2004. Google ScholarGoogle ScholarDigital LibraryDigital Library
  24. N. Weaver, V. Paxson, S. Staniford, and R. Cunningham. A Taxonomy of Computer Worms. In ACM CCS Workshop on Rapid Malcode (WORM), October 2003. Google ScholarGoogle ScholarDigital LibraryDigital Library
  25. V. Yegneswaran, P. Barford, and J. Ullrich. Internet Intrusions: Global Characteristics and Prevalence. In ACM SIGMETRICS, San Diego, June 2003. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Characterization of network-wide anomalies in traffic flows

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in
    • Published in

      cover image ACM Conferences
      IMC '04: Proceedings of the 4th ACM SIGCOMM conference on Internet measurement
      October 2004
      386 pages
      ISBN:1581138210
      DOI:10.1145/1028788

      Copyright © 2004 ACM

      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 25 October 2004

      Permissions

      Request permissions about this article.

      Request Permissions

      Check for updates

      Qualifiers

      • Article

      Acceptance Rates

      Overall Acceptance Rate277of1,083submissions,26%

      Upcoming Conference

      IMC '24
      ACM Internet Measurement Conference
      November 4 - 6, 2024
      Madrid , AA , Spain

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader