首页> 外文学位 >Scan Statistics for the Online Discovery of Locally Anomalous Subgraphs.
【24h】

Scan Statistics for the Online Discovery of Locally Anomalous Subgraphs.

机译:扫描统计信息以在线发现局部异常子图。

获取原文
获取原文并翻译 | 示例

摘要

Identifying anomalies in computer networks is a challenging and complex problem. Often, anomalies occur in extremely local areas of the network. Locality is complex in this setting, since we have an underlying graph structure. To identify local anomalies, we introduce a scan statistic for data extracted from the edges of a graph over time. In the computer network setting, the data on these edges are multivariate measures of the communications between two distinct machines, over time.;We describe two shapes for capturing locality in the graph: the star and the k-path. While the star shape is not new to the literature, the path shape, when used as a scan window, appears to be novel. Both of these shapes are motivated by hacker behaviors observed in real attacks. A hacker who is using a single central machine to examine other machines creates a star-shaped anomaly on the edges emanating from the central node. Paths represent traversal of a hacker through a network, using a set of machines in sequence.;To identify local anomalies, these shapes are enumerated over the entire graph, over a set of sliding time windows. Local statistics in each window are compared with their historic behavior to capture anomalies within the window. These local statistics are model-based. To capture the communications between computers, we have applied two different models, observed and hidden Markov models, to each edge in the network. These models have been effective in handling various aspects of this type of data, but do not completely describe the data. Therefore, we also present ongoing work in the modeling of host-to-host communications in a computer network.;Data speeds on larger networks require online detection to be nimble. We describe a full anomaly detection system, which has been applied to a corporate sized network and achieves better than real-time analysis speed. We present results on simulated data whose parameters were estimated from real network data. In addition, we present a result from our analysis of a real, corporate-sized network data set. These results are very encouraging, since the detection corresponded to exactly the type of behavior we hope to detect.
机译:识别计算机网络中的异常是一个具有挑战性的复杂问题。通常,异常会发生在网络的极端区域。在这种情况下,局部性很复杂,因为我们具有基础的图结构。为了识别局部异常,我们针对随时间从图的边缘提取的数据引入了扫描统计信息。在计算机网络设置中,这些边上的数据是随时间推移两个不同机器之间通信的多元度量。我们在图中描述了两种捕获位置的形状:星形和k形。尽管星形对于文献来说并不陌生,但路径形状用作扫描窗口时,似乎是新颖的。这两种形状均受实际攻击中观察到的黑客行为的影响。使用单个中央计算机检查其他计算机的黑客在从中央节点发出的边缘上创建了一个星形异常。路径表示使用一组机器依次通过网络穿越黑客的过程。为了识别局部异常,这些形状会在一组滑动时间窗口内的整个图表中枚举。将每个窗口中的本地统计信息与其历史行为进行比较,以捕获窗口中的异常。这些本地统计信息是基于模型的。为了捕获计算机之间的通信,我们对网络的每个边缘应用了两种不同的模型,即观察到的隐马尔可夫模型。这些模型在处理此类数据的各个方面均很有效,但并未完全描述数据。因此,我们还在计算机网络中的主机到主机通信建模中提出了正在进行的工作。大型网络上的数据速度要求在线检测要灵活。我们描述了一个完整的异常检测系统,该系统已应用于企业规模的网络,并且比实时分析速度要好。我们介绍了模拟数据的结果,这些数据的参数是根据实际网络数据估算得出的。此外,我们还提供了对真实的公司规模网络数据集的分析结果。这些结果非常令人鼓舞,因为检测准确地对应于我们希望检测的行为类型。

著录项

  • 作者

    Neil, Joshua Charles.;

  • 作者单位

    The University of New Mexico.;

  • 授予单位 The University of New Mexico.;
  • 学科 Statistics.;Computer Science.
  • 学位 Ph.D.
  • 年度 2011
  • 页码 104 p.
  • 总页数 104
  • 原文格式 PDF
  • 正文语种 eng
  • 中图分类
  • 关键词

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号