Title: An overview of flow-based anomaly detection

Authors: Rohini Sharma; Ajay Guleria; R.K. Singla

Addresses: Department of Computer Science and Applications, Panjab University, Chandigarh, India ' Computer Centre, Panjab University, Chandigarh, India ' Department of Computer Science and Applications, Panjab University, Chandigarh, India

Abstract: Intrusions in computer networks are handled using misuse or anomaly-based solutions. Deep packet inspection is generally incorporated in solutions for better detection and mitigation but with the growth of networks at exponential speed, it has become an expensive solution and makes real-time detection difficult. In this paper, network flows-based anomaly detection techniques are reviewed. The review starts with motivation behind using network flows and justifies why flow-based anomaly detection is the need of the hour. Flow-based datasets are also investigated and reviewed. The main focus is on techniques and methodologies used by researchers for anomaly detection in computer networks. The techniques reviewed are categorised into five classes: statistical, machine learning, clustering, frequent pattern mining and agent-based. At the end the core research problems and open challenges are discussed.

Keywords: network flows; anomaly detection; security; privacy; flow-based dataset; statistical techniques; machine learning; clustering; frequent pattern mining; software agents.

DOI: 10.1504/IJCNDS.2018.094221

International Journal of Communication Networks and Distributed Systems, 2018 Vol.21 No.2, pp.220 - 240

Accepted: 29 Jan 2018
Published online: 22 Aug 2018 *

Full-text access for editors Full-text access for subscribers Purchase this article Comment on this article