Anomaly Extraction in Backbone Network Using Association Rules

Download Now
Provided by: Creative Commons
Topic: Security
Format: PDF
Anomaly detection techniques are the last line of defence when other approaches fail to detect security threats or other problems. Anomaly extraction refers to automatically finding in a large set of flows observed during an anomalous time interval, the flows associated with the anomalous event(s). It is important for several applications ranging from root cause analysis, to attack mitigation, and testing anomaly detectors. In this paper, the authors use meta-data provided by several histogram based detectors to identify suspicious flows and then apply association rule mining to find anomalous flow, and summarize the flow.
Download Now

Find By Topic