CFP last date
20 January 2025
Reseach Article

Mining Anomaly using Association Rule

by Mahadik Priyanka V., Kosbatwar Shyam P.
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 67 - Number 24
Year of Publication: 2013
Authors: Mahadik Priyanka V., Kosbatwar Shyam P.
10.5120/11734-7338

Mahadik Priyanka V., Kosbatwar Shyam P. . Mining Anomaly using Association Rule. International Journal of Computer Applications. 67, 24 ( April 2013), 9-12. DOI=10.5120/11734-7338

@article{ 10.5120/11734-7338,
author = { Mahadik Priyanka V., Kosbatwar Shyam P. },
title = { Mining Anomaly using Association Rule },
journal = { International Journal of Computer Applications },
issue_date = { April 2013 },
volume = { 67 },
number = { 24 },
month = { April },
year = { 2013 },
issn = { 0975-8887 },
pages = { 9-12 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume67/number24/11734-7338/ },
doi = { 10.5120/11734-7338 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T21:26:19.015293+05:30
%A Mahadik Priyanka V.
%A Kosbatwar Shyam P.
%T Mining Anomaly using Association Rule
%J International Journal of Computer Applications
%@ 0975-8887
%V 67
%N 24
%P 9-12
%D 2013
%I Foundation of Computer Science (FCS), NY, USA
Abstract

In a world where critical equipments are connected to internet, hence protection against professional cyber criminals is important. Today network security, uptime and performance of network are important and serious issue in computer network. Anomaly is deviation from normal behavior which is factor that affects on network security. So Anomaly Extraction which detects and extracts anomalous flow from network is requirement of network operator. Using Histogram based detector to identify anomalies and then applying Association rule mining, anomalies will extracted. Apriori algorithm will use to generate the set of rule applied on metadata. Identification and Extraction of anomalous flow can be used for useful application e. g. Root cause analysis, Network forensics, Modeling anomalies etc.

References
  1. D. Brauckhoff, X. Dimitropoulos, AWanger, and K. Salamatian: Anomaly Extraction in Backbone network using Association Rule. IEEE 2012.
  2. W. Lee and S. J. Stolfo, Data mining approaches for intrusion detection, in proc. 7thUSENIX Security Symp. , 1998, vol. 7, p. 6.
  3. Ramakrishnan Srikant: Fast algorithm for mining association rule and sequential pattern, at university of Wisconsin, 1996.
  4. A. Kind, M. P. Stoecklin, X. Dimitropoulos. Histogram-based traffic anomaly detection, IEEE Trans. Netw Service Manage. , voi. 6, no. 2, pp. 110-121, Jun. 2009
  5. D. Brauckhoff, M. May, and K. Salamatian, Applying PCA for Traffic Anomaly Detection: Problems and Solutions, in IEEE INFOCOM MiniConference, 2009.
  6. A. Lakhina, M. Crovella, and C. Diot, Mining anomalies using traffic feature distributions, in Proc. ACM SIGCOMM, 2005, PP. 217-228.
  7. Paul Barford, Jeffery Kline, David Plonka and Amos Ron. A Signal Analysis of Network Traffic Anomalies, IMW' 02, Nov. 6-8, 2002, Marseille, France
  8. I. Paredes Oliva,X. mitropoulos,M. M. Dante,P. Barlet-Ros, D. Brauckhoff, Automating Root-Cause Analysis of Network Anomalies using Frequent Itemset Mining,SIGCOMM'10,Aug 30-Sept 3,2010.
  9. Fernando Silveira Thomson and Christophe Diot Thomson, UPMC Paris Universitas, URCA: Pulling out Anomalies by their Root Causes, in proc. IEEE INFOCOM, Mar. 2010. pp. 1-9.
  10. M. P. Stoecklin, J. -Y. L. Boudec, and A. Kind,A two-layered anomaly detection technique based on multi-modal flow behavior models, in PAM: Proceedings of 9th International Conference on Passive and Active Measurement, ser. Lecture Notes in Computer Science. Springer, 2008,pp. 212–221.
Index Terms

Computer Science
Information Sciences

Keywords

Anomaly Detection Anomaly Extraction Association Rule Data Mining