SlideShare a Scribd company logo
Traffic Anomaly Detection and Attack
Recognition
QRATOR Labs
Anomaly Recognition Qrator Labs2
The threat
Network attack is becoming a major threat on nations,
governmental institutions, critical infrastructures and business
organizations. Some attacks are focused on exploiting software
vulnerabilities to implement denial of service attacks, damage or
steal important data. Other use a large number of infected
machines to implement denial-of-service attacks. In this
presentation we are focusing on detecting network attacks by
detecting the anomalies in network traffic flow data and
anomalous behavior of the network applications. The goal is to
detect the beginning of the attack in a real-time and to detect
when the system is returned back to the normal state.
Anomaly Recognition Qrator Labs3
The threat
The network traffic flow data can be represented by a set of network-level
metrics (amount of packets for different protocols, inbound and outbound
traffic, etc.) and application-level metrics (like the response duration
histogram for web server). These metrics are collected by the traffic analyser
at fixed rate. The goal for the state analyzer is to detect anomalous network
and application behavior basing on these metrics.
The input data for the analyzer is statistics matrix that contains a single row for
every traffic time slice. Each row contains the network-level and application-
level features that come from different scales. This matrix is the input for the
intrusion detection processes (both training and detection steps).
Anomaly Recognition Qrator Labs4
DARPA: simulated attacks on air base[1]
The example of IP-domen traffic’s features due one day and its relations (features)
The stochastic process X={x1,…xn} where x_i- all features at the moment of the time
Anomaly Recognition Qrator Labs5
The threat
Challenge: How to process an “ocean” of data in order to find abnormal
patterns in the data? How to fuse data from different sources (sensors) to find
correlations and anomalies? How to find distances in high-dimensional data?
How can we determine whether a point belongs to a cluster/segment or not?
The goal is to identify points that deviate from normal behaviour which reside
in the cluster. How we treat huge high dimensional data that is dynamically
and constantly changes? How can we model the high dimensional data to find
deviations from normal behavior?
Anomaly Recognition Qrator Labs6
Network Intrusion Detection Systems
Anomaly Recognition Qrator Labs7
Electronic intelligence and Cyber threat management:
Generic approach
Theory, efficient algorithms, software and prototypes (integrated system) which
process data in real time to detect anomalies that deviate from normal behavior
Anomaly Recognition Qrator Labs8
DARPA: simulated attacks on air base[1]
Anomaly Recognition Qrator Labs9
DARPA: simulated attacks on air base[1]
Anomaly Recognition Qrator Labs10
Problem setup
Anomaly Recognition Qrator Labs11
Standard approach: Diffusion Maps (DM)
Anomaly Recognition Qrator Labs12
Standard approach: Diffusion Maps (DM)
[2] R.R. Coifman, S. Lafon, Diffusion maps, Applied and Computational
Harmonic Analysis, 21, 5-30, 2006.
Anomaly Recognition Qrator Labs13
Standard approach: Diffusion Maps (DM)
It is easy to see that the map has the following properties:
• The map represents the data in a space of dimension m.
• The map is not linear.
• The distance between the images of points is equal to the diffuse
distance, that is, the probability to get from point x to point y via
random walk on the graph for the time t.
Anomaly Recognition Qrator Labs14
Standard approach: Diffusion Maps (DM)
The figure illustrates the effectiveness of the separation of mixed known
clusters via “diffusion maps”. If the generated data is represented as two
interlocking rings (marked different shades of blue), no any linear methods is
able to divide it. Nevertheless, a random walk on the graph represented by
these rings, have ability to divide the classes. The probability remain inside
the same ring by random walk is greater than the probability of jumping
from one ring to another.
Anomaly Recognition Qrator Labs15
Diffusion Maps (DM): The problem
Classification background and anomaly?
Anomaly Recognition Qrator Labs16
Diffusion Maps (DM): The problem
BAD RESULT
Anomaly Recognition Qrator Labs17
Diffusion Maps (DM): The problem
Anomalies are not grouped in clusters
Anomaly Recognition Qrator Labs18
Advanced approach: Homotopy in Temporal Diffusion Maps (DM)
2
2
2
1
2
2
mod)(

ji xxDji
ij eeG

Diffusion operator
The diffusion geometry is oriented around a smooth parametric curve. The
curve represents the day and night
Anomaly Recognition Qrator Labs19
Advanced approach: Homotopy in Temporal Diffusion Maps (DM)
Once X is mapped - extension of to , using
representatives from X (sampling)
f Xx
Xx
Anomaly Recognition Qrator Labs20
Advanced approach: Homotopy in Temporal Diffusion Maps (DM)
iELet
be approximating
curve and Xx
iE
Define homotopy G(x)



i
i
iEx
iExiE
xxG
))(,(
))(,()(
)(


)( xG
Anomaly Recognition Qrator Labs21
Advanced approach: Homotopy in Temporal Diffusion Maps (DM)
iELet
be approximating
curve and Xx
iE
Define homotopy G(x)



i
i
iEx
iExiE
xxG
))(,(
))(,()(
)(


)( xG
Anomaly Recognition Qrator Labs22
Advanced approach: Alpha-stream process for anomaly detection
Anomaly Recognition Qrator Labs23
Advanced approach: Alpha-stream process for anomaly detection
Anomaly Recognition Qrator Labs24
Advanced approach: Alpha-stream process for anomaly detection
Image Processing application of “alpha-stream”: Object segmentation
Anomaly Recognition Qrator Labs25
Anomaly Recognition Qrator Labs26
The features(left) and its representation in DM (right)
Anomaly Recognition Qrator Labs27
Anomaly Recognition Qrator Labs28
The features(left) and its representation in DM (right)
Anomaly Recognition Qrator Labs29
Anomaly Recognition Qrator Labs30
anomalies background
anomalies 0,95 0,05
background 0,03 0,97
Table 1: distribution of the “false-
positive” and “true-negative” for the
result of presented algorithm.
anomalies background
anomalies 0,63 0,37
background 0,29 0,71
Table 2: distribution of the “false-
positive” and “true-negative” for the
result of projection on PCA.

More Related Content

Viewers also liked (20)

PPTX
Anomaly Detection for Real-World Systems
Manojit Nandi
 
PPTX
Where is Data Going? - RMDC Keynote
Ted Dunning
 
PDF
Parallel Programming in Python: Speeding up your analysis
Manojit Nandi
 
PPTX
Monitoring without alerts
Alois Reitbauer
 
PPTX
Can a monitoring tool pass the turing test
Alois Reitbauer
 
PPTX
Monitoring large scale Docker production environments
Alois Reitbauer
 
PPTX
The Dark Art of Production Alerting
Alois Reitbauer
 
PPTX
PyGotham 2016
Manojit Nandi
 
PPTX
The definition of normal - An introduction and guide to anomaly detection.
Alois Reitbauer
 
PDF
Cloud Tech III: Actionable Metrics
royrapoport
 
PDF
SSL Certificate Expiration and Howler Monkey's Inception
royrapoport
 
PDF
Python Through the Back Door: Netflix Presentation at CodeMash 2014
royrapoport
 
PPTX
Monitoring Docker Application in Production
Alois Reitbauer
 
PPTX
Ruxit - How we launched a global monitoring platform on AWS in 80 days.
Alois Reitbauer
 
PPTX
Five Things I Learned While Building Anomaly Detection Tools - Toufic Boubez ...
tboubez
 
PDF
Anomaly Detection for Global Scale at Netflix
Extract Data Conference
 
PDF
Anomaly Detection at Scale
Jeff Henrikson
 
PPTX
Evaluating Real-Time Anomaly Detection: The Numenta Anomaly Benchmark
Numenta
 
PDF
Operational Insight: Concepts and Examples (w/o Presenter Notes)
royrapoport
 
PPTX
Real time analytics @ netflix
Cody Rioux
 
Anomaly Detection for Real-World Systems
Manojit Nandi
 
Where is Data Going? - RMDC Keynote
Ted Dunning
 
Parallel Programming in Python: Speeding up your analysis
Manojit Nandi
 
Monitoring without alerts
Alois Reitbauer
 
Can a monitoring tool pass the turing test
Alois Reitbauer
 
Monitoring large scale Docker production environments
Alois Reitbauer
 
The Dark Art of Production Alerting
Alois Reitbauer
 
PyGotham 2016
Manojit Nandi
 
The definition of normal - An introduction and guide to anomaly detection.
Alois Reitbauer
 
Cloud Tech III: Actionable Metrics
royrapoport
 
SSL Certificate Expiration and Howler Monkey's Inception
royrapoport
 
Python Through the Back Door: Netflix Presentation at CodeMash 2014
royrapoport
 
Monitoring Docker Application in Production
Alois Reitbauer
 
Ruxit - How we launched a global monitoring platform on AWS in 80 days.
Alois Reitbauer
 
Five Things I Learned While Building Anomaly Detection Tools - Toufic Boubez ...
tboubez
 
Anomaly Detection for Global Scale at Netflix
Extract Data Conference
 
Anomaly Detection at Scale
Jeff Henrikson
 
Evaluating Real-Time Anomaly Detection: The Numenta Anomaly Benchmark
Numenta
 
Operational Insight: Concepts and Examples (w/o Presenter Notes)
royrapoport
 
Real time analytics @ netflix
Cody Rioux
 

Similar to Traffic anomaly detection and attack (20)

PDF
Term_Paper_Shengzhe_Wang
Shengzhe Wang
 
PDF
AI in anomaly detection - An Overview.pdf
StephenAmell4
 
PPTX
Anomaly Detection and Spark Implementation - Meetup Presentation.pptx
Impetus Technologies
 
PDF
AI in anomaly detection.pdf
StephenAmell4
 
PDF
Anomaly Detection
Carol Hargreaves
 
PDF
An Introduction to Anomaly Detection
Kenneth Graham
 
PPTX
Anomaly detection
Dr. Stylianos Kampakis
 
PPTX
Anomaly Detection - Real World Scenarios, Approaches and Live Implementation
Impetus Technologies
 
PPTX
Anomaly Detection - New York Machine Learning
Ted Dunning
 
PPTX
Anomaly Detection Technique
Chakrit Phain
 
PDF
anomalydetection-191104083630.pdf
hanadi40
 
PDF
Strata 2014 Anomaly Detection
Ted Dunning
 
PPTX
Anomalies and events keep us on our toes
CSIRO
 
PDF
Anomaly detection Workshop slides
QuantUniversity
 
PDF
Strata 2014-tdunning-anomaly-detection-140211162923-phpapp01
MapR Technologies
 
PPTX
Looking out for anomalies
CSIRO
 
PDF
Pattern recognition at scale anomaly detection in banking on stream data
NUS-ISS
 
PDF
Anomly and fraud detection using AI - Artivatic.ai
Artivatic.ai
 
PDF
Fraud detection- Retail, Banking, Finance & FMCG
Artivatic.ai
 
PPTX
Time Series Anomaly Detection with .net and Azure
Marco Parenzan
 
Term_Paper_Shengzhe_Wang
Shengzhe Wang
 
AI in anomaly detection - An Overview.pdf
StephenAmell4
 
Anomaly Detection and Spark Implementation - Meetup Presentation.pptx
Impetus Technologies
 
AI in anomaly detection.pdf
StephenAmell4
 
Anomaly Detection
Carol Hargreaves
 
An Introduction to Anomaly Detection
Kenneth Graham
 
Anomaly detection
Dr. Stylianos Kampakis
 
Anomaly Detection - Real World Scenarios, Approaches and Live Implementation
Impetus Technologies
 
Anomaly Detection - New York Machine Learning
Ted Dunning
 
Anomaly Detection Technique
Chakrit Phain
 
anomalydetection-191104083630.pdf
hanadi40
 
Strata 2014 Anomaly Detection
Ted Dunning
 
Anomalies and events keep us on our toes
CSIRO
 
Anomaly detection Workshop slides
QuantUniversity
 
Strata 2014-tdunning-anomaly-detection-140211162923-phpapp01
MapR Technologies
 
Looking out for anomalies
CSIRO
 
Pattern recognition at scale anomaly detection in banking on stream data
NUS-ISS
 
Anomly and fraud detection using AI - Artivatic.ai
Artivatic.ai
 
Fraud detection- Retail, Banking, Finance & FMCG
Artivatic.ai
 
Time Series Anomaly Detection with .net and Azure
Marco Parenzan
 
Ad

More from Qrator Labs (20)

PDF
Годовой отчет Qrator Labs об угрозах интернета 2017
Qrator Labs
 
PDF
Qrator Labs annual report 2017
Qrator Labs
 
PDF
Memcached amplification DDoS: a 2018 threat.
Qrator Labs
 
PDF
DNS Survival Guide.
Qrator Labs
 
PDF
BGP Flexibility and its Consequences.
Qrator Labs
 
PDF
BGP Route Leaks at Ripe74
Qrator Labs
 
PDF
IoT: реальная угроза или маркетинг?
Qrator Labs
 
PDF
Network Security in 2016
Qrator Labs
 
PDF
Состояние сетевой безопасности в 2016 году
Qrator Labs
 
PDF
Сколько стоит доступ в память, и что с этим делать
Qrator Labs
 
PDF
Анализ количества посетителей на сайте [Считаем уникальные элементы]
Qrator Labs
 
PDF
Caution i pv6 is here
Qrator Labs
 
PPTX
Масштабируя TLS
Qrator Labs
 
PDF
ISP Border Definition
Qrator Labs
 
PDF
DDoS Attacks in 2017: Beyond Packet Filtering
Qrator Labs
 
PDF
Internet Roads of Caucasus
Qrator Labs
 
PDF
Latency i pv4 vs ipv6
Qrator Labs
 
PDF
Особенности использования машинного обучения при защите от DDoS-атак
Qrator Labs
 
PDF
Финансовый сектор. Аспекты информационной безопасности 2016
Qrator Labs
 
PDF
White Paper. Эволюция DDoS-атак и средств противодействия данной угрозе
Qrator Labs
 
Годовой отчет Qrator Labs об угрозах интернета 2017
Qrator Labs
 
Qrator Labs annual report 2017
Qrator Labs
 
Memcached amplification DDoS: a 2018 threat.
Qrator Labs
 
DNS Survival Guide.
Qrator Labs
 
BGP Flexibility and its Consequences.
Qrator Labs
 
BGP Route Leaks at Ripe74
Qrator Labs
 
IoT: реальная угроза или маркетинг?
Qrator Labs
 
Network Security in 2016
Qrator Labs
 
Состояние сетевой безопасности в 2016 году
Qrator Labs
 
Сколько стоит доступ в память, и что с этим делать
Qrator Labs
 
Анализ количества посетителей на сайте [Считаем уникальные элементы]
Qrator Labs
 
Caution i pv6 is here
Qrator Labs
 
Масштабируя TLS
Qrator Labs
 
ISP Border Definition
Qrator Labs
 
DDoS Attacks in 2017: Beyond Packet Filtering
Qrator Labs
 
Internet Roads of Caucasus
Qrator Labs
 
Latency i pv4 vs ipv6
Qrator Labs
 
Особенности использования машинного обучения при защите от DDoS-атак
Qrator Labs
 
Финансовый сектор. Аспекты информационной безопасности 2016
Qrator Labs
 
White Paper. Эволюция DDoS-атак и средств противодействия данной угрозе
Qrator Labs
 
Ad

Recently uploaded (20)

PPTX
Research Design - Report on seminar in thesis writing. PPTX
arvielobos1
 
PDF
123546568reb2024-Linux-remote-logging.pdf
lafinedelcinghiale
 
PDF
Technical Guide to Build a Successful Shopify Marketplace from Scratch.pdf
CartCoders
 
PDF
Apple_Environmental_Progress_Report_2025.pdf
yiukwong
 
PPTX
Template Timeplan & Roadmap Product.pptx
ImeldaYulistya
 
PDF
The Complete Guide to Chrome Net Internals DNS – 2025
Orage Technologies
 
PPTX
ipv6 very very very very vvoverview.pptx
eyala75
 
PPTX
西班牙武康大学毕业证书{UCAMOfferUCAM成绩单水印}原版制作
Taqyea
 
PDF
AI_MOD_1.pdf artificial intelligence notes
shreyarrce
 
PPTX
ZARA-Case.pptx djdkkdjnddkdoodkdxjidjdnhdjjdjx
RonnelPineda2
 
PPTX
英国假毕业证诺森比亚大学成绩单GPA修改UNN学生卡网上可查学历成绩单
Taqyea
 
PDF
Internet Governance and its role in Global economy presentation By Shreedeep ...
Shreedeep Rayamajhi
 
PPT
Computer Securityyyyyyyy - Chapter 2.ppt
SolomonSB
 
PPTX
internet básico presentacion es una red global
70965857
 
PDF
DevOps Design for different deployment options
henrymails
 
PPT
introductio to computers by arthur janry
RamananMuthukrishnan
 
PDF
How to Fix Error Code 16 in Adobe Photoshop A Step-by-Step Guide.pdf
Becky Lean
 
PPTX
ONLINE BIRTH CERTIFICATE APPLICATION SYSYTEM PPT.pptx
ShyamasreeDutta
 
PDF
Digital Security in 2025 with Adut Angelina
The ClarityDesk
 
PPTX
Cost_of_Quality_Presentation_Software_Engineering.pptx
farispalayi
 
Research Design - Report on seminar in thesis writing. PPTX
arvielobos1
 
123546568reb2024-Linux-remote-logging.pdf
lafinedelcinghiale
 
Technical Guide to Build a Successful Shopify Marketplace from Scratch.pdf
CartCoders
 
Apple_Environmental_Progress_Report_2025.pdf
yiukwong
 
Template Timeplan & Roadmap Product.pptx
ImeldaYulistya
 
The Complete Guide to Chrome Net Internals DNS – 2025
Orage Technologies
 
ipv6 very very very very vvoverview.pptx
eyala75
 
西班牙武康大学毕业证书{UCAMOfferUCAM成绩单水印}原版制作
Taqyea
 
AI_MOD_1.pdf artificial intelligence notes
shreyarrce
 
ZARA-Case.pptx djdkkdjnddkdoodkdxjidjdnhdjjdjx
RonnelPineda2
 
英国假毕业证诺森比亚大学成绩单GPA修改UNN学生卡网上可查学历成绩单
Taqyea
 
Internet Governance and its role in Global economy presentation By Shreedeep ...
Shreedeep Rayamajhi
 
Computer Securityyyyyyyy - Chapter 2.ppt
SolomonSB
 
internet básico presentacion es una red global
70965857
 
DevOps Design for different deployment options
henrymails
 
introductio to computers by arthur janry
RamananMuthukrishnan
 
How to Fix Error Code 16 in Adobe Photoshop A Step-by-Step Guide.pdf
Becky Lean
 
ONLINE BIRTH CERTIFICATE APPLICATION SYSYTEM PPT.pptx
ShyamasreeDutta
 
Digital Security in 2025 with Adut Angelina
The ClarityDesk
 
Cost_of_Quality_Presentation_Software_Engineering.pptx
farispalayi
 

Traffic anomaly detection and attack

  • 1. Traffic Anomaly Detection and Attack Recognition QRATOR Labs
  • 2. Anomaly Recognition Qrator Labs2 The threat Network attack is becoming a major threat on nations, governmental institutions, critical infrastructures and business organizations. Some attacks are focused on exploiting software vulnerabilities to implement denial of service attacks, damage or steal important data. Other use a large number of infected machines to implement denial-of-service attacks. In this presentation we are focusing on detecting network attacks by detecting the anomalies in network traffic flow data and anomalous behavior of the network applications. The goal is to detect the beginning of the attack in a real-time and to detect when the system is returned back to the normal state.
  • 3. Anomaly Recognition Qrator Labs3 The threat The network traffic flow data can be represented by a set of network-level metrics (amount of packets for different protocols, inbound and outbound traffic, etc.) and application-level metrics (like the response duration histogram for web server). These metrics are collected by the traffic analyser at fixed rate. The goal for the state analyzer is to detect anomalous network and application behavior basing on these metrics. The input data for the analyzer is statistics matrix that contains a single row for every traffic time slice. Each row contains the network-level and application- level features that come from different scales. This matrix is the input for the intrusion detection processes (both training and detection steps).
  • 4. Anomaly Recognition Qrator Labs4 DARPA: simulated attacks on air base[1] The example of IP-domen traffic’s features due one day and its relations (features) The stochastic process X={x1,…xn} where x_i- all features at the moment of the time
  • 5. Anomaly Recognition Qrator Labs5 The threat Challenge: How to process an “ocean” of data in order to find abnormal patterns in the data? How to fuse data from different sources (sensors) to find correlations and anomalies? How to find distances in high-dimensional data? How can we determine whether a point belongs to a cluster/segment or not? The goal is to identify points that deviate from normal behaviour which reside in the cluster. How we treat huge high dimensional data that is dynamically and constantly changes? How can we model the high dimensional data to find deviations from normal behavior?
  • 6. Anomaly Recognition Qrator Labs6 Network Intrusion Detection Systems
  • 7. Anomaly Recognition Qrator Labs7 Electronic intelligence and Cyber threat management: Generic approach Theory, efficient algorithms, software and prototypes (integrated system) which process data in real time to detect anomalies that deviate from normal behavior
  • 8. Anomaly Recognition Qrator Labs8 DARPA: simulated attacks on air base[1]
  • 9. Anomaly Recognition Qrator Labs9 DARPA: simulated attacks on air base[1]
  • 10. Anomaly Recognition Qrator Labs10 Problem setup
  • 11. Anomaly Recognition Qrator Labs11 Standard approach: Diffusion Maps (DM)
  • 12. Anomaly Recognition Qrator Labs12 Standard approach: Diffusion Maps (DM) [2] R.R. Coifman, S. Lafon, Diffusion maps, Applied and Computational Harmonic Analysis, 21, 5-30, 2006.
  • 13. Anomaly Recognition Qrator Labs13 Standard approach: Diffusion Maps (DM) It is easy to see that the map has the following properties: • The map represents the data in a space of dimension m. • The map is not linear. • The distance between the images of points is equal to the diffuse distance, that is, the probability to get from point x to point y via random walk on the graph for the time t.
  • 14. Anomaly Recognition Qrator Labs14 Standard approach: Diffusion Maps (DM) The figure illustrates the effectiveness of the separation of mixed known clusters via “diffusion maps”. If the generated data is represented as two interlocking rings (marked different shades of blue), no any linear methods is able to divide it. Nevertheless, a random walk on the graph represented by these rings, have ability to divide the classes. The probability remain inside the same ring by random walk is greater than the probability of jumping from one ring to another.
  • 15. Anomaly Recognition Qrator Labs15 Diffusion Maps (DM): The problem Classification background and anomaly?
  • 16. Anomaly Recognition Qrator Labs16 Diffusion Maps (DM): The problem BAD RESULT
  • 17. Anomaly Recognition Qrator Labs17 Diffusion Maps (DM): The problem Anomalies are not grouped in clusters
  • 18. Anomaly Recognition Qrator Labs18 Advanced approach: Homotopy in Temporal Diffusion Maps (DM) 2 2 2 1 2 2 mod)(  ji xxDji ij eeG  Diffusion operator The diffusion geometry is oriented around a smooth parametric curve. The curve represents the day and night
  • 19. Anomaly Recognition Qrator Labs19 Advanced approach: Homotopy in Temporal Diffusion Maps (DM) Once X is mapped - extension of to , using representatives from X (sampling) f Xx Xx
  • 20. Anomaly Recognition Qrator Labs20 Advanced approach: Homotopy in Temporal Diffusion Maps (DM) iELet be approximating curve and Xx iE Define homotopy G(x)    i i iEx iExiE xxG ))(,( ))(,()( )(   )( xG
  • 21. Anomaly Recognition Qrator Labs21 Advanced approach: Homotopy in Temporal Diffusion Maps (DM) iELet be approximating curve and Xx iE Define homotopy G(x)    i i iEx iExiE xxG ))(,( ))(,()( )(   )( xG
  • 22. Anomaly Recognition Qrator Labs22 Advanced approach: Alpha-stream process for anomaly detection
  • 23. Anomaly Recognition Qrator Labs23 Advanced approach: Alpha-stream process for anomaly detection
  • 24. Anomaly Recognition Qrator Labs24 Advanced approach: Alpha-stream process for anomaly detection Image Processing application of “alpha-stream”: Object segmentation
  • 26. Anomaly Recognition Qrator Labs26 The features(left) and its representation in DM (right)
  • 28. Anomaly Recognition Qrator Labs28 The features(left) and its representation in DM (right)
  • 30. Anomaly Recognition Qrator Labs30 anomalies background anomalies 0,95 0,05 background 0,03 0,97 Table 1: distribution of the “false- positive” and “true-negative” for the result of presented algorithm. anomalies background anomalies 0,63 0,37 background 0,29 0,71 Table 2: distribution of the “false- positive” and “true-negative” for the result of projection on PCA.