JOURNAL ARTICLE

Network traffic analysis based on collective anomaly detection

Abstract

There is a growing interest in the data mining and network management communities to improve the existing techniques for prompt analysis of underlying traffic patterns. Anomaly detection is one such technique to detect abnormalities in many different domains including computer network intrusion, gene expression analysis, financial fraud detection and many more. In this paper, we develop a framework to discover interesting traffic flows, which seem legitimate but are targeted to disrupt normal computing environment, such as Denial of Service attack. We propose a framework for collective anomaly detection using x-means clustering, which is a variant of basic k-means algorithm. We validate our approach by comparing against existing techniques and benchmark performance. Our experimental results are based on widely accepted DARPA dataset for intrusion detection from MIT Lincoln Laboratory.

Keywords:
Anomaly detection Intrusion detection system Computer science Denial-of-service attack Benchmark (surveying) Data mining Cluster analysis Anomaly (physics) Traffic analysis Botnet Machine learning Computer security The Internet

Metrics

41
Cited By
4.83
FWCI (Field Weighted Citation Impact)
14
Refs
0.95
Citation Normalized Percentile
Is in top 1%
Is in top 10%

Citation History

Topics

Anomaly Detection Techniques and Applications
Physical Sciences →  Computer Science →  Artificial Intelligence
Network Security and Intrusion Detection
Physical Sciences →  Computer Science →  Computer Networks and Communications
Internet Traffic Analysis and Secure E-voting
Physical Sciences →  Computer Science →  Artificial Intelligence

Related Documents

JOURNAL ARTICLE

Collective Anomaly Detection Techniques for Network Traffic Analysis

Mohiuddin Ahmed

Journal:   Annals of Data Science Year: 2018 Vol: 5 (4)Pages: 497-512
BOOK-CHAPTER

Network Traffic Pattern Analysis Using Improved Information Theoretic Co-clustering Based Collective Anomaly Detection

Mohiuddin AhmedAbdun Naser Mahmood

Lecture notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering Year: 2015 Pages: 204-219
© 2026 ScienceGate Book Chapters — All rights reserved.