A traffic anomaly detection approach in communication networks for applications of multimedia medical devices

Anomalous or unnormal multimedia medical devices are to yield anomaly network traffic and affect the diagnosis about medical issues. How to find anomaly network traffic is significantly important for normal applications of multimedia medical devices. This paper studies traffic anomaly detection problem in large-scale communication networks with multimedia medical devices. We employ empirical mode decomposition method and wavelet packet transform to propose an accurate detection method to capture it. Firstly, we use the wavelet packet transform to pre-treat network traffic. Network traffic is decomposed into multiple narrowband signals exhibiting more detailed features of network traffic. Secondly, the empirical mode decomposition method is utilized to divide these narrowband signals into the intrinsic mode function at different scales, in time and time-frequency domains. We calculate the spectral kurtosis value of the intrinsic mode function at these different scales to remove false components of the empirical mode decomposition. As a result, we can obtain new time and time-frequency signals which highlight the hidden nature of anomaly network traffic. Thirdly, we perform the reconstruction of empirical mode decompositions and wavelet packet transforms for the above time and time-frequency signals to attain a series of new time signals. Then we can find and diagnose abnormal network traffic. Simulation results show that our method is effective and promising.

[1]  Luigi V. Mancini,et al.  Large-Scale Traffic Anomaly Detection: Analysis of Real Netflow Datasets , 2012, ICETE.

[2]  Dingde Jiang,et al.  GARCH model-based large-scale IP traffic matrix estimation , 2009, IEEE Communications Letters.

[3]  Taghi M. Khoshgoftaar,et al.  Network Traffic Prediction Models for Near- and Long-Term Predictions , 2014, 2014 IEEE International Conference on Bioinformatics and Bioengineering.

[4]  Tao Qin,et al.  Dynamic Feature Analysis and Measurement for Large-Scale Network Traffic Monitoring , 2010, IEEE Transactions on Information Forensics and Security.

[5]  Aditya Akella,et al.  Redundancy in network traffic: findings and implications , 2009, SIGMETRICS '09.

[6]  Zhihan Lv,et al.  Multimedia cloud transmission and storage system based on internet of things , 2017, Multimedia Tools and Applications.

[7]  Rituparna Chaki,et al.  State of the art analysis of network traffic anomaly detection , 2014, 2014 Applications and Innovations in Mobile Computing (AIMoC).

[8]  Zhihan Lv,et al.  ARPPS: Augmented Reality Pipeline Prospect System , 2015, ICONIP.

[9]  Fabien Millioz,et al.  Circularity of the STFT and Spectral Kurtosis for Time-Frequency Segmentation in Gaussian Environment , 2011, IEEE Transactions on Signal Processing.

[10]  Yong Chen,et al.  WebVR - - Web Virtual Reality Engine Based on P2P network , 2011, J. Networks.

[11]  Paul Barford,et al.  A signal analysis of network traffic anomalies , 2002, IMW '02.

[12]  Dingde Jiang,et al.  Joint time-frequency sparse estimation of large-scale network traffic , 2011, Comput. Networks.

[13]  Maozhu Jin,et al.  Robust environmental closed-loop supply chain design under uncertainty , 2015 .

[14]  Peng Zhang,et al.  A transform domain-based anomaly detection approach to network-wide traffic , 2014, J. Netw. Comput. Appl..

[15]  Mehmet Celenk,et al.  Predictive Network Anomaly Detection and Visualization , 2010, IEEE Transactions on Information Forensics and Security.

[16]  Lijun Xu,et al.  Cancellation of harmonic interference by baseline shifting of wavelet packet decomposition coefficients , 2005, IEEE Transactions on Signal Processing.

[17]  Mark Crovella,et al.  Diagnosing network-wide traffic anomalies , 2004, SIGCOMM '04.

[18]  Jiang Jiang,et al.  A Bayesian approach for sleep and wake classification based on dynamic time warping method , 2017, Multimedia Tools and Applications.

[19]  Ioannis Lambadaris,et al.  Studies in applying PCA and wavelet algorithms for network traffic anomaly detection , 2013, 2013 IEEE 14th International Conference on High Performance Switching and Routing (HPSR).

[20]  Melike Erol-Kantarci,et al.  Periodicity-Based Anomalies in Self-Similar Network Traffic Flow Measurements , 2011, IEEE Transactions on Instrumentation and Measurement.

[21]  Haiqing Li,et al.  Flow Pattern Identification Based on EMD and LS-SVM for Gas–Liquid Two-Phase Flow in a Minichannel , 2011, IEEE Transactions on Instrumentation and Measurement.

[22]  Casaseca-de-la-HigueraPablo,et al.  Anomaly Detection in Network Traffic Based on Statistical Inference and \alpha-Stable Modeling , 2011 .

[23]  Peng Zhang,et al.  A Wavelet-Based Detection Approach to Traffic Anomalies , 2011, 2011 Seventh International Conference on Computational Intelligence and Security.

[24]  Mohamed Ridza Wahiddin,et al.  Visualization of a Scale Free Network in a Smartphone-Based Multimedia Big Data Environment , 2015, 2015 IEEE International Conference on Multimedia Big Data.

[25]  Hiroshi Esaki,et al.  Nine years of observing traffic anomalies: Trending analysis in backbone networks , 2013, 2013 IFIP/IEEE International Symposium on Integrated Network Management (IM 2013).

[26]  Sanjay Chawla,et al.  Network Traffic Decomposition for Anomaly Detection , 2014, ArXiv.

[27]  Shiow-Fen Hwang,et al.  An efficient traffic control system using dynamic thresholding techniques in wireless mesh networks , 2011, Int. J. Commun. Syst..

[28]  Yu Gu,et al.  Unsupervised Ensemble Anomaly Detection through Time-Periodical Packet Sampling , 2010, 2010 INFOCOM IEEE Conference on Computer Communications Workshops.

[29]  Wen-Liang Hwang,et al.  EMD Revisited: A New Understanding of the Envelope and Resolving the Mode-Mixing Problem in AM-FM Signals , 2012, IEEE Transactions on Signal Processing.

[30]  Vipin Kumar,et al.  Anomaly Detection for Discrete Sequences: A Survey , 2012, IEEE Transactions on Knowledge and Data Engineering.

[31]  Xinwen Fu,et al.  Self-Disciplinary Worms and Countermeasures: Modeling and Analysis , 2010, IEEE Transactions on Parallel and Distributed Systems.

[32]  Dingde Jiang,et al.  A time-frequency detecting method for network traffic anomalies , 2010, International Conference on Computational Problem-Solving.

[33]  Stefanos Gritzalis,et al.  Innovations in emerging multimedia communication systems , 2015, Telecommun. Syst..

[34]  Yi Wang,et al.  A novel approach for approximate aggregations over arrays , 2015, SSDBM.

[35]  Cheng Yao,et al.  Multi‐scale anomaly detection for high‐speed network traffic , 2015, Trans. Emerg. Telecommun. Technol..

[36]  Tao Qin,et al.  Monitoring abnormal network traffic based on blind source separation approach , 2011, J. Netw. Comput. Appl..

[37]  Ioannis Lambadaris,et al.  Network traffic anomaly detection using clustering techniques and performance comparison , 2013, 2013 26th IEEE Canadian Conference on Electrical and Computer Engineering (CCECE).

[38]  James Z. Zhang,et al.  Network traffic anomaly detection using weighted self-similarity based on EMD , 2013, 2013 Proceedings of IEEE Southeastcon.

[39]  George N. Rouskas,et al.  Anomalous Loss Performance for Mixed Real-Time and TCP Traffic in Routers With Very Small Buffers , 2011, IEEE/ACM Transactions on Networking.

[40]  N. Huang,et al.  The empirical mode decomposition and the Hilbert spectrum for nonlinear and non-stationary time series analysis , 1998, Proceedings of the Royal Society of London. Series A: Mathematical, Physical and Engineering Sciences.

[41]  Urbashi Mitra,et al.  Parametric Methods for Anomaly Detection in Aggregate Traffic , 2011, IEEE/ACM Transactions on Networking.

[42]  Naixue Xiong,et al.  Anomaly secure detection methods by analyzing dynamic characteristics of the network traffic in cloud communications , 2014, Inf. Sci..

[43]  Xiaonan Wang,et al.  Hierarchical and low‐power IPv6 address configuration for wireless sensor networks , 2012, Int. J. Commun. Syst..

[44]  Mark Crovella,et al.  Distributed Spatial Anomaly Detection , 2008, IEEE INFOCOM 2008 - The 27th Conference on Computer Communications.

[45]  Chung-Horng Lung,et al.  Network Traffic Anomaly Detection Using Adaptive Density-Based Fuzzy Clustering , 2014, 2014 IEEE 13th International Conference on Trust, Security and Privacy in Computing and Communications.

[46]  Ali A. Ghorbani,et al.  IEEE TRANSACTIONS ON SYSTEMS, MAN, AND CYBERNETICS—PART C: APPLICATIONS AND REVIEWS 1 Toward Credible Evaluation of Anomaly-Based Intrusion-Detection Methods , 2022 .

[47]  Jianxiong Zhou,et al.  A Low-Power and Portable Biomedical Device for Respiratory Monitoring with a Stable Power Source , 2015, Sensors.

[48]  Yennun Huang,et al.  Network traffic anomaly detection based on growing hierarchical SOM , 2013, 2013 43rd Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN).

[49]  Zhihan Lv,et al.  Cryptanalysis and improvement of Panda - public auditing for shared data in cloud and internet of things , 2017, Multimedia Tools and Applications.

[50]  Ivan W. Selesnick,et al.  On the Dual-Tree Complex Wavelet Packet and $M$-Band Transforms , 2008, IEEE Transactions on Signal Processing.

[51]  Ying Li,et al.  ChainCluster: Engineering a Cooperative Content Distribution Framework for Highway Vehicular Communications , 2014, IEEE Transactions on Intelligent Transportation Systems.

[52]  Zhengzheng,et al.  An Approximate Approach to End-to-End Traffic in Communication Networks , 2012 .

[53]  Juan Cheng,et al.  The Effectively Method of Detecting Network Traffic Anomaly , 2013 .

[54]  Zhihan Lv,et al.  Touch-less interactive augmented reality game on vision-based wearable device , 2015, Personal and Ubiquitous Computing.

[55]  Dingde Jiang,et al.  How to reconstruct end-to-end traffic based on time-frequency analysis and artificial neural network , 2014 .

[56]  Andreas Mauthe,et al.  Traffic anomaly diagnosis in Internet backbone networks: A survey , 2014, Comput. Networks.

[57]  Zhihan Lv,et al.  A Self-Assessment Stereo Capture Model Applicable to the Internet of Things , 2015, Sensors.

[58]  Yannis A. Dimitriadis,et al.  Anomaly Detection in Network Traffic Based on Statistical Inference and \alpha-Stable Modeling , 2011, IEEE Transactions on Dependable and Secure Computing.

[59]  Shuping Dang,et al.  Modeling of Mobile Communication Systems by Electromagnetic Theory in the Direct and Single Reflected Propagation Scenario , 2015 .

[60]  J.B. Evans,et al.  Describing Network Traffic Using the Index of Variability , 2009, IEEE/ACM Transactions on Networking.

[61]  Chunxiang Guo,et al.  Dynamic systems based on preference graph and distance , 2015 .

[62]  Xinwen Zhang,et al.  Assessing Attack Surface with Component-Based Package Dependency , 2015, NSS.

[63]  Nicu Sebe,et al.  Event Oriented Dictionary Learning for Complex Event Detection , 2015, IEEE Transactions on Image Processing.

[64]  Hui Tian,et al.  Anomaly Detection by Diffusion Wavelet-Based Analysis on Traffic Matrix , 2014, 2014 Sixth International Symposium on Parallel Architectures, Algorithms and Programming.

[65]  Zhihan Lv,et al.  Game On, Science - How Video Game Technology May Help Biologists Tackle Visualization Challenges , 2013, PloS one.