Robust regression for anomaly detection

作者: Ziyu Wang , Jiahai Yang , Zhang ShiZe , Chenxi Li

DOI: 10.1109/ICC.2017.7997373

关键词:

摘要: In our previous work, we have applied ordinary linear regression equation to network anomaly detection. However, the performance of is susceptible outliers. Unfortunately, it almost impossible obtain a “clean” traffic data set for model due burstiness and pervasive attacks. this paper, make use robust techniques mitigate impact outliers in training set. The experiment results show that based method more reliable than face

参考文章(12)
Jianping Wu, Jessie Hui Wang, Jiahai Yang, CNGI-CERNET2 ACM SIGCOMM Computer Communication Review. ,vol. 41, pp. 48- 52 ,(2011) , 10.1145/1971162.1971170
Benjamin I.P. Rubinstein, Blaine Nelson, Ling Huang, Anthony D. Joseph, Shing-hon Lau, Satish Rao, Nina Taft, J. D. Tygar, Stealthy poisoning attacks on PCA-based anomaly detectors measurement and modeling of computer systems. ,vol. 37, pp. 73- 74 ,(2009) , 10.1145/1639562.1639592
Wenji Chen, Yang Liu, Yong Guan, Cardinality change-based early detection of large-scale cyber-attacks 2013 Proceedings IEEE INFOCOM. pp. 1788- 1796 ,(2013) , 10.1109/INFCOM.2013.6566977
Dapeng Liu, Youjian Zhao, Haowen Xu, Yongqian Sun, Dan Pei, Jiao Luo, Xiaowei Jing, Mei Feng, Opprentice: Towards Practical and Automatic Anomaly Detection Through Machine Learning internet measurement conference. pp. 211- 224 ,(2015) , 10.1145/2815675.2815679
Sriharsha Gangam, Puneet Sharma, Sonia Fahmy, Pegasus: Precision hunting for icebergs and anomalies in network flows 2013 Proceedings IEEE INFOCOM. pp. 1420- 1428 ,(2013) , 10.1109/INFCOM.2013.6566936
Fabio Soldo, Ahmed Metwally, Traffic anomaly detection based on the IP size distribution international conference on computer communications. pp. 2005- 2013 ,(2012) , 10.1109/INFCOM.2012.6195581
Anukool Lakhina, Mark Crovella, Christophe Diot, Diagnosing network-wide traffic anomalies Proceedings of the 2004 conference on Applications, technologies, architectures, and protocols for computer communications - SIGCOMM '04. ,vol. 34, pp. 219- 230 ,(2004) , 10.1145/1015467.1015492
Anukool Lakhina, Mark Crovella, Christophe Diot, Mining anomalies using traffic feature distributions acm special interest group on data communication. ,vol. 35, pp. 217- 228 ,(2005) , 10.1145/1080091.1080118
A. Rodriguez, A. Laio, Clustering by fast search and find of density peaks Science. ,vol. 344, pp. 1492- 1496 ,(2014) , 10.1126/SCIENCE.1242072
Ziyu Wang, Jiahai Yang, Fuliang Li, A New Anomaly Detection Method Based on IGTE and IGFE security and privacy in communication networks. pp. 93- 109 ,(2014) , 10.1007/978-3-319-23802-9_10