File(s) under permanent embargo
A general collaborative framework for modeling and perceiving distributed network behavior
journal contribution
posted on 2016-10-13, 00:00 authored by Y Xie, Yu Wang, H He, Yang Xiang, S Yu, X LiuCollaborative Anomaly Detection (CAD) is an emerging field of network security in both academia and industry. It has attracted a lot of attention, due to the limitations of traditional fortress-style defense modes. Even though a number of pioneer studies have been conducted in this area, few of them concern about the universality issue. This work focuses on two aspects of it. First, a unified collaborative detection framework is developed based on network virtualization technology. Its purpose is to provide a generic approach that can be applied to designing specific schemes for various application scenarios and objectives. Second, a general behavior perception model is proposed for the unified framework based on hidden Markov random field. Spatial Markovianity is introduced to model the spatial context of distributed network behavior and stochastic interaction among interconnected nodes. Algorithms are derived for parameter estimation, forward prediction, backward smooth, and the normality evaluation of both global network situation and local behavior. Numerical experiments using extensive simulations and several real datasets are presented to validate the proposed solution. Performance-related issues and comparison with related works are discussed.
History
Journal
IEEE/ACM transactions on networkingVolume
24Issue
5Pagination
3162 - 3176Publisher
IEEELocation
Piscataway, N.J.Publisher DOI
ISSN
1063-6692eISSN
1558-2566Language
engPublication classification
C Journal article; C1 Refereed article in a scholarly journalCopyright notice
2016, IEEEUsage metrics
Keywords
behavior modelingcollaborative defensedistributed detectionnetwork securityScience & TechnologyTechnologyComputer Science, Hardware & ArchitectureComputer Science, Theory & MethodsEngineering, Electrical & ElectronicTelecommunicationsComputer ScienceEngineeringINTRUSION DETECTIONINTERNETDistributed Computing