Visible to the public Anomalies Detection of Routers Based on Multiple Information Learning

TitleAnomalies Detection of Routers Based on Multiple Information Learning
Publication TypeConference Paper
Year of Publication2018
AuthorsLi, Teng, Ma, Jianfeng, Pei, Qingqi, Shen, Yulong, Sun, Cong
Conference Name2018 International Conference on Networking and Network Applications (NaNA)
ISBN Number978-1-5386-8303-3
Keywordsanomaly detection, communication devices, Computer bugs, computer network security, Correlation, diagnostics, feature extraction, input routers, Internet, learning, learning (artificial intelligence), Metrics, multiple information learning, privacy, pubcrawl, resilience, Resiliency, router anomalies detection, router security, router syslogs, router system, Router Systems Security, routers, security, security of data, Syslogs, telecommunication network routing
Abstract

Routers are important devices in the networks that carry the burden of transmitting information among the communication devices on the Internet. If a malicious adversary wants to intercept the information or paralyze the network, it can directly attack the routers and then achieve the suspicious goals. Thus, preventing router security is of great importance. However, router systems are notoriously difficult to understand or diagnose for their inaccessibility and heterogeneity. The common way of gaining access to the router system and detecting the anomaly behaviors is to inspect the router syslogs or monitor the packets of information flowing to the routers. These approaches just diagnose the routers from one aspect but do not consider them from multiple views. In this paper, we propose an approach to detect the anomalies and faults of the routers with multiple information learning. We try to use the routers' information not from the developer's view but from the user' s view, which does not need any expert knowledge. First, we do the offline learning to transform the benign or corrupted user actions into the syslogs. Then, we try to decide whether the input routers' conditions are poor or not with clustering. During the detection phase, we use the distance between the event and the cluster to decide if it is the anomaly event and we can provide the corresponding solutions. We have applied our approach in a university network which contains Cisco, Huawei and Dlink routers for three months. We aligned our experiment with former work as a baseline for comparison. Our approach can gain 89.6% accuracy in detecting the attacks which is 5.1% higher than the former work. The results show that our approach performs in limited time as well as memory usages and has high detection and low false positives.

URLhttps://ieeexplore.ieee.org/document/8648730
DOI10.1109/NANA.2018.8648730
Citation Keyli_anomalies_2018