SCNTA: Monitoring of Network Availability and Activity for Identification of Anomalies Using Machine Learning Approaches

SCNTA: Monitoring of Network Availability and Activity for Identification of Anomalies Using Machine Learning Approaches

Romil Rawat, Bhagwati Garg, Kiran Pachlasiya, Vinod Mahor, Shrikant Telang, Mukesh Chouhan, Surendra Kumar Shukla, Rina Mishra
DOI: 10.4018/IJITWE.297971
Article PDF Download
Open access articles are freely available for download

Abstract

Real-time network inspection applications face a threat of vulnerability as high-speed networks continue to expand. For companies and ISPs, real-time traffic classification is an issue. The classifier monitor is made up of three modules: Capturing_of_Packets (CoP) and pre-processing, Reconciliation_of_Flow (RoF), and categorization of Machine Learning (ML). Based on parallel processing along with well-defined interfacing of data, the modules are framed, allowing each module to be modified and upgraded separately. The Reconciliation_of_Flow (RoF) mechanism becomes the output bottleneck in this pipeline. In this implementation, an optimal reconciliation process was used, resulting in an average delivery time of 0.62 seconds. In order to verify our method, we equated the results of the AdaBoost Ensemble Learning Algorithm (ABELA), Naive Bayes (NB), Decision Tree (DT), K-Nearest Neighbor (KNN), and Flexible Naive Bayes (FNB) in the classification module. The architectural design of the run time CSNTA categorization (flow-based) scheme is presented in this paper.
Article Preview
Top

1. Introduction

Suspicious mass traffic is constantly evolving, making network behaviour tracing and structure more complex. Cloud-based gaming (Garcia et al.,2021) and grid networks are consuming an increasing amount of SNTA, and flow data is frequently used in traffic monitoring systems.For example, NetFlow (Demertzis et al.,2021) and IETF IPFIX (Goodall et al.,2018) describe a standard for routers and switches to export flow information and are widely used by Internet service providers (ISPs) and businesses to retrieve sensitive business applications, find unidentified signatures, analyze traffic communication patterns, gather data for accounting, and track anomalies. The identification of traffic devices distributed on their networks is a critical concern for companies and ISPs (Xu and Zhu,2021). Semi-supervised learning has received a lot of interest in pattern recognition and ML models. The field of traffic monitoring and categorization has a significant number of journals. The majority of articles concentrate on either reassembling traffic flows or classifying and identifying traffic, but not both. The design of a run-time CSNTA for monitoring organizational networks is described in this document. It also compares and contrasts various ML techniques (Rajawat et al., 2021) for network vulnerable traffic detection. The bidirectional flow principle underpins the classifier monitor. This implies that traffic flow, whether total or subflows, is the fundamental entity to be classified in a determined signature. A flow between two hosts is described by one or more packets of the same quintuple: protocol sort (ICMP, UDP, and TCP), source and destination (Sockets). Deep Traffic analysis (DTA) is the form of Information refining (tracing) (Torabi et al., 2020) that examines about data being transmitted across a network in great detail and takes appropriate measures (like alerting and blocking, rerouting, recording). DTA is frequently used for benchmark application behavior, and monitor network traffic, diagnose network efficiency, ensure for data authenticity and format, and check for suspicious signatures, eavesdropping (Aceto et al., 2021). with network censorship. Despite the description, network infrastructure only has to utilize the first header (the IP header) for regular functioning; nevertheless, usage of 2nd header (TCP/UDP) is typically considered as shallow packet analysis (SPA) (also termed - stateful packet analysis). Packets can be obtained in a variety of methods for DTA. A typical method is to use port mirroring (also known as Span Port) (Torabi et al., 2020) or to physically introduce network tap that copies and delivers data stream at developed for the determination for investigation. DTA (and filtering) allows for sophisticated network configuration, interaction, security features, internet data mining(DM). Despite the fact that DTA used for network configuration for several years, few net neutrality activists are concerned about use of anticompetitive manner or to restrict the accessibility of the Internet. The network telescope (NT) (packets telescope, untrusted network, Network motion sensor, the black hole) (Dias et al., 2019) is indeed a Internet technology allowing users to monitor Huge scale Internet activities. The main idea is to monitor traffic directed at the network's dark (unused) address space. Because all traffic to these addresses is suspect, watching it can provide insight into potential network threats at packet headers (random monitoring worms, DoS/DDoS backscatter), and several further misconfigurations.

Complete Article List

Search this Journal:
Reset
Volume 19: 1 Issue (2024)
Volume 18: 1 Issue (2023)
Volume 17: 4 Issues (2022): 1 Released, 3 Forthcoming
Volume 16: 4 Issues (2021)
Volume 15: 4 Issues (2020)
Volume 14: 4 Issues (2019)
Volume 13: 4 Issues (2018)
Volume 12: 4 Issues (2017)
Volume 11: 4 Issues (2016)
Volume 10: 4 Issues (2015)
Volume 9: 4 Issues (2014)
Volume 8: 4 Issues (2013)
Volume 7: 4 Issues (2012)
Volume 6: 4 Issues (2011)
Volume 5: 4 Issues (2010)
Volume 4: 4 Issues (2009)
Volume 3: 4 Issues (2008)
Volume 2: 4 Issues (2007)
Volume 1: 4 Issues (2006)
View Complete Journal Contents Listing