Internet Traffic Behavior Profiling for Network Security Monitoring

Kuai Xu, Zhi Li Zhang, Supratik Bhattacharyya

Research output: Contribution to journalArticlepeer-review

76 Scopus citations

Abstract

Recent spates of cyber-attacks and frequent emergence of applications affecting Internet traffic dynamics have made it imperative to develop effective techniques that can extract, and make sense of, significant communication patterns from Internet traffic data for use in network operations and security management. In this paper, we present a general methodology for building comprehensive behavior profiles of Internet backbone traffic in terms of communication patterns of end-hosts and services. Relying on data mining and entropy-based techniques, the methodology consists of significant cluster extraction, automatic behavior classification and structural modeling for in-depth interpretive analyses. We validate the methodology using data sets from the core of the Internet.

Original languageEnglish (US)
Pages (from-to)1241-1252
Number of pages12
JournalIEEE/ACM Transactions on Networking
Volume16
Issue number6
DOIs
StatePublished - Dec 2008

Bibliographical note

Funding Information:
Manuscript received March 25, 2006; revised March 31, 2007 and July 29, 2007. First published February 22, 2008; current version published December 17, 2008. Approved by IEEE/ACM TRANSACTIONS ON NETWORKING Editor D. Veitch. This work was supported in part by the National Science Foundation (NSF) under Grants CNS-0435444 and CNS-0626812, in part by a University of Minnesota Digital Technology Center DTI grant, and in part by a Sprint ATL gift grant.

Keywords

  • Anomaly behavior
  • monitoring
  • traffic profiling

Fingerprint Dive into the research topics of 'Internet Traffic Behavior Profiling for Network Security Monitoring'. Together they form a unique fingerprint.

Cite this