Big Data Analysis
Network anomaly detection using big data analysis
- Analyzing network failure/cyber attacks and their root causes -
Abstract
Network anomalies including network failures and cyber attacks are major concerns for both network and security operators, and their rapid detection is crucial to the provision of safe and reliable services. We are developing technologies for the rapid detection of such events via log messages from security appliances, network equipment, and servers or social media information such as Twitter messages. Since such information is atypical and its volume can be huge, we adopt machine learning methods, for example, mining temporal/host correlations in logs to detect network failure events or malicious hosts. By employing these technologies, we will help to provide safe and reliable communication services for our customers.
Poster

Please click the thumbnail image to open the full-size PDF file.
Reference
- K. Sato, K. Ishibashi, H. Hasegawa, and H. Yoshino, “Extending
Black Domain Name List by Using Co-occurrence Relation between DNS
Queries,” IEICE Trans. Commun., 2012.
- T. Hariu, M. Akiyama, K. Aoki, T. Yagi, M. Iwamura, H. Kurakami,
“Detection, Analysis, and Countermeasure Technologies for Cyber
Attacks from Evolving Malware,” NTT Technical Review, Vol. 10, No. 10,
2012.
- T. Kimura, T. Mori, K. Ishibashi, and K. Shiomoto, "Mining Network Logs
for Diagnosing Large-scale Networks Problems," IEICE Tech. Rep.
NS2011-255, 2012.
Presentor
Keisuke Ishibashi
Network Technology Laboratories
Communication Traffic & Service Quality Project
Hiroshi Asakura
Secure Platform Laboratories
Network Security Project