<?xml version='1.0' encoding='UTF-8'?>
<OAI-PMH xmlns="http://www.openarchives.org/OAI/2.0/" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:schemaLocation="http://www.openarchives.org/OAI/2.0/ http://www.openarchives.org/OAI/2.0/OAI-PMH.xsd">
  <responseDate>2026-03-09T02:57:47Z</responseDate>
  <request metadataPrefix="oai_dc" identifier="oai:ir.soken.ac.jp:00002686" verb="GetRecord">https://ir.soken.ac.jp/oai</request>
  <GetRecord>
    <record>
      <header>
        <identifier>oai:ir.soken.ac.jp:00002686</identifier>
        <datestamp>2023-06-20T15:46:52Z</datestamp>
        <setSpec>2:429:19</setSpec>
      </header>
      <metadata>
        <oai_dc:dc xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:oai_dc="http://www.openarchives.org/OAI/2.0/oai_dc/" xmlns="http://www.w3.org/2001/XMLSchema" xsi:schemaLocation="http://www.openarchives.org/OAI/2.0/oai_dc/ http://www.openarchives.org/OAI/2.0/oai_dc.xsd">
          <dc:title>Increasing Reliability in Network Traffic Anomaly Detection</dc:title>
          <dc:title>Increasing Reliability in Network Traffic Anomaly Detection</dc:title>
          <dc:creator>FONTUGNE, Romain Thibault</dc:creator>
          <dc:creator>フォンテュニュ, ロマン　ティボ</dc:creator>
          <dc:creator>FONTUGNE, Romain Thibault</dc:creator>
          <dc:description>総合研究大学院大学</dc:description>
          <dc:description>博士（情報学）</dc:description>
          <dc:description>Network traffic anomalies stand for a large fraction of the Internet traffic and&#13;
compromise the performance of the network resources. Detecting and diagnos-&#13;
ing these threats is a laborious and time consuming task that network operators&#13;
face daily. During the last decade researchers have concentrated their efforts&#13;
on this problem and proposed several tools to automate this task. Thereby,&#13;
recent advances in anomaly detection have permitted to detect new or unknown&#13;
anomalies by taking advantage of statistical analysis of the traffic. In spite of&#13;
the advantages of these detection methods, researchers have reported several&#13;
common drawbacks discrediting their use in practice. Indeed, the challenge of&#13;
understanding the relation between the theory underlying these methods and&#13;
the actual Internet traffic raises several issues. For example, the difficulty of&#13;
selecting the optimal parameter set for these methods mitigates their perfor-&#13;
mance and prevent network operators from using them. Moreover, due to the&#13;
lack of ground truth data, approximate evaluations of these detection methods&#13;
prevent to provide accurate feedback on them and increase their reliability. We&#13;
address these issues, first, by proposing a pattern-recognition-based detection&#13;
method that overcomes the common drawbacks of anomaly detectors based on&#13;
statistical analysis, second, by providing both a benchmark tool that compares&#13;
the results from diverse detectors and ground truth data obtained by combining&#13;
several anomaly detectors.&#13;
&amp;nbsp; &amp;nbsp;The proposed pattern-recognition-based detector takes advantage of image&#13;
processing techniques to provide intuitive outputs and parameter set. An adap-&#13;
tive mechanism automatically tuning its parameter set according to traffic fluc-&#13;
tuations is also proposed. The resulting adaptive anomaly detector is easily&#13;
usable in practice, performs a high detection rate, and provides intuitive de-&#13;
scription of the anomalies allowing to identify their root causes.&#13;
&amp;nbsp; &amp;nbsp;A benchmark methodology is also developed in order to compare several&#13;
detectors based on different theoretical background. This methodology allows&#13;
researchers to accurately identify the differences between the results of diverse&#13;
detectors. We employ this methodology along with an unsupervised combina-&#13;
tion strategy to combine the output of four anomaly detectors. Thereby, the&#13;
combination strategy increases the overall reliability of the combined detectors&#13;
and it detects two times more anomalies than the best detector. We provide&#13;
the results of this combination of detectors in the form of ground truth data&#13;
containing various anomalies during 10 years of traffic.</dc:description>
          <dc:description>application/pdf</dc:description>
          <dc:description>総研大甲第1456号</dc:description>
          <dc:description>thesis</dc:description>
          <dc:date>2011-09-30</dc:date>
          <dc:format>application/pdf</dc:format>
          <dc:format>application/pdf</dc:format>
          <dc:identifier>https://ir.soken.ac.jp/record/2686/files/甲1456_要旨.pdf</dc:identifier>
          <dc:identifier>https://ir.soken.ac.jp/record/2686/files/甲1456_本文.pdf</dc:identifier>
          <dc:identifier>https://ir.soken.ac.jp/records/2686</dc:identifier>
          <dc:language>eng</dc:language>
        </oai_dc:dc>
      </metadata>
    </record>
  </GetRecord>
</OAI-PMH>
