Anomalies Detection of Routers Based on Multiple Information Learning
Title | Anomalies Detection of Routers Based on Multiple Information Learning |
Publication Type | Conference Paper |
Year of Publication | 2018 |
Authors | Li, Teng, Ma, Jianfeng, Pei, Qingqi, Shen, Yulong, Sun, Cong |
Conference Name | 2018 International Conference on Networking and Network Applications (NaNA) |
ISBN Number | 978-1-5386-8303-3 |
Keywords | anomaly detection, communication devices, Computer bugs, computer network security, Correlation, diagnostics, feature extraction, input routers, Internet, learning, learning (artificial intelligence), Metrics, multiple information learning, privacy, pubcrawl, resilience, Resiliency, router anomalies detection, router security, router syslogs, router system, Router Systems Security, routers, security, security of data, Syslogs, telecommunication network routing |
Abstract | Routers are important devices in the networks that carry the burden of transmitting information among the communication devices on the Internet. If a malicious adversary wants to intercept the information or paralyze the network, it can directly attack the routers and then achieve the suspicious goals. Thus, preventing router security is of great importance. However, router systems are notoriously difficult to understand or diagnose for their inaccessibility and heterogeneity. The common way of gaining access to the router system and detecting the anomaly behaviors is to inspect the router syslogs or monitor the packets of information flowing to the routers. These approaches just diagnose the routers from one aspect but do not consider them from multiple views. In this paper, we propose an approach to detect the anomalies and faults of the routers with multiple information learning. We try to use the routers' information not from the developer's view but from the user' s view, which does not need any expert knowledge. First, we do the offline learning to transform the benign or corrupted user actions into the syslogs. Then, we try to decide whether the input routers' conditions are poor or not with clustering. During the detection phase, we use the distance between the event and the cluster to decide if it is the anomaly event and we can provide the corresponding solutions. We have applied our approach in a university network which contains Cisco, Huawei and Dlink routers for three months. We aligned our experiment with former work as a baseline for comparison. Our approach can gain 89.6% accuracy in detecting the attacks which is 5.1% higher than the former work. The results show that our approach performs in limited time as well as memory usages and has high detection and low false positives. |
URL | https://ieeexplore.ieee.org/document/8648730 |
DOI | 10.1109/NANA.2018.8648730 |
Citation Key | li_anomalies_2018 |
- privacy
- telecommunication network routing
- Syslogs
- security of data
- security
- routers
- Router Systems Security
- router system
- router syslogs
- router security
- router anomalies detection
- Resiliency
- resilience
- pubcrawl
- Anomaly Detection
- multiple information learning
- Metrics
- learning (artificial intelligence)
- learning
- internet
- input routers
- feature extraction
- Diagnostics
- Correlation
- computer network security
- Computer bugs
- communication devices