CFP last date
20 December 2024
Reseach Article

Anomaly Extraction and Mitigation using Efficient-Web Miner Algorithm

by Gargi Joshi, A. K. Bongale
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 100 - Number 2
Year of Publication: 2014
Authors: Gargi Joshi, A. K. Bongale
10.5120/17495-8024

Gargi Joshi, A. K. Bongale . Anomaly Extraction and Mitigation using Efficient-Web Miner Algorithm. International Journal of Computer Applications. 100, 2 ( August 2014), 8-13. DOI=10.5120/17495-8024

@article{ 10.5120/17495-8024,
author = { Gargi Joshi, A. K. Bongale },
title = { Anomaly Extraction and Mitigation using Efficient-Web Miner Algorithm },
journal = { International Journal of Computer Applications },
issue_date = { August 2014 },
volume = { 100 },
number = { 2 },
month = { August },
year = { 2014 },
issn = { 0975-8887 },
pages = { 8-13 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume100/number2/17495-8024/ },
doi = { 10.5120/17495-8024 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T22:28:51.934679+05:30
%A Gargi Joshi
%A A. K. Bongale
%T Anomaly Extraction and Mitigation using Efficient-Web Miner Algorithm
%J International Journal of Computer Applications
%@ 0975-8887
%V 100
%N 2
%P 8-13
%D 2014
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Today network security, uptime and performance of network are important and serious issues in computer network. Anomaly is deviation from normal behavior affecting network security. Anomaly Extraction is identification of unusual flow from network, which is need of network operator. Anomaly extraction aims to automatically find the inconsistencies in large set of data observed during an anomalous time interval. Extracted anomalies will be important for root cause analysis, network forensics, attack mitigation and anomaly modeling. Frequent pattern mining technique namely Efficient-Web Miner Algorithm will be used to generate the set of association rules applied on metadata. Using network traffic log data, algorithms effectively finds the flow associated with the anomalous event(s). Efficient-Web Miner Algorithm triggers a very small number of false positives. Efficient- Web Miner has much better performance in terms of time and space complexity than Apriori Algorithm and its variations like Apriori All algorithm. for large data sets This anomaly extraction method significantly reduces the time needed for analyzing alarms, making anomaly detection systems more practical, simple and realistic. System makes an effort to mitigate the anomaly so detected without human intervention. Proposed system provides human overrides in mitigation process and inculcates self-learning approach which is advantageous.

References
  1. D. Brauckhoff, X. Dimitropoulos, A. Wagner, and K Salamatian, "Anomaly extraction in backbone networks using association rules,"inProc. IEEE ACM TRANSACTION ON NETWORKING, VOL. 20. NO 6, DECEMBER 2012.
  2. M. Yadav,P. Keserwani, S. Samaddar "An efficient web mining algorithm for web log analysis: E Web Miner" RAIT 2012.
  3. F. Silveira and C. Diot, "URCA: Pulling out anomalies by their root causes," in Proc. IEEE INFOCOM, Mar. 2010, pp. 1-9.
  4. A. Kind, M. P. Stoecklin, and X. Dimitropoulos, "Histogram-based traffic anomaly detection," IEEE Trans. Netw. Service Manage. , vol. 6, no. 2, pp. 110-121, Jun. 2009.
  5. M. P. Stoecklin, J. -Y. L. Boudec, and A. Kind, "A two-layered anomaly detection technique based on multi-modal flow behavior models," in Proc. 9th PAM, 2008, Lecture Notes in Computer Science, pp. 212-221.
  6. X. Li, F. Bian, M. Crovella, C. Diot, R. Govindan, G. Iannaccone,and A. Lakhina, "Detection and identification of network anomaliesusing sketch subspaces," in Proc. 6th ACM SIGCOMM IMC, 2006,pp. 147 -152.
  7. K. H. Ramah, K. Salamatian, and F. Kamoun, "Scan surveillance in Internet networks," in Proc. Netw. , 2009, pp. 614-625
  8. B. Krishnamurthy, S. Sen, Y. Zhang, and Y. Chen, "Sketch-based change detection: Methods, evaluation, and applications," in Proc. 3rdACM SIGCOMM IMC, 2003, pp. 234-247.
  9. G. Cormode and S. Muthukrishnan, "What's new: Finding significant differences in network data streams," IEEE/ACM Trans. Netw. , vol. 13, no. 6, pp. 1219-1232, Dec. 2005.
  10. Y. Gu, A. McCallum, and D. Towsley, "Detecting anomalies in network traffic using maximum entropy estimation," in Proc. 5th ACM SIGCOMM IMC, 2005, pp. 32-32.
  11. G. Dewaele, K. Fukuda, P. Borgnat, P. Abry, andK. Cho,"Extractinghidden anomalies using sketch and non Gaussian multi resolution statistical detection procedures," in Proc. LSAD, 2007, pp. 145-152.
  12. A. Lakhina, M. Crovella, and C. Diot,"Diagnosing network-wide traffic anomalies," in Proc. ACM SIGCOMM, 2004, pp. 219-230.
  13. W. Lee and S. J. Stolfo, "Data mining approaches for intrusion detection," in Proc. 7th USENIX Security Symp. , 1998, vol. 7, p. 6.
  14. R. Vaarandi, "Mining event logs with SLCT and LogHound," in Proc. IEEE NOMS, Apr. 2008, pp. 1071-1074.
  15. K. Yoshida, Y. Shomura, and Y. Watanabe "Visualizing networkstatus," in Proc. Int. Conf. Mach. Learning Cybern. , Aug. 2007, vol. 4, pp. 2094-2099.
  16. X. Li and Z. -H. Deng, "Mining frequent patterns from network flowsfor monitoring network," Expert Syst. Appl. vol. 37, no. 12, pp. 8850-8860, 2010.
  17. V. Chandola and V. Kumar, "Summarization—Compressing data intoan informative representation," Knowl. Inf. Syst. , vol. 12, pp. 355-378,2007.
  18. M. V. Mahoney and P. K. Chan, "Learning rules for anomaly detection of hostile network traffic," in Proc. 3rd IEEE ICDM, 2003, pp. 601-6
  19. G. Cormode and S. Muthukrishnan, "An improved data stream sum- mary: The count-min sketch and its applications," J. Algor. , vol. 55, no. 1, pp. 58-75, 2005.
  20. Tong, Wang and Pi-lian, He, Web Log Mining by an ImprovedAprioriAll Algorithm World Academy of Science,EngineeringandTechnology, Vol 4 2005 pp 97-100.
Index Terms

Computer Science
Information Sciences

Keywords

Anomaly Extraction Association rule mining data mining detection algorithms Efficient-Web Miner Algorithm