Host Behavior in Computer Network: One-Year Study
An analysis of a host behavior is an essential key for modern network management and security. A robust behavior profile enables the network managers to detect anomalies with high accuracy, predict the host behavior, or group host to clusters for better management. Hence, host profiling methods attr...
Gespeichert in:
Veröffentlicht in: | IEEE eTransactions on network and service management 2021-03, Vol.18 (1), p.822-838 |
---|---|
Hauptverfasser: | , |
Format: | Artikel |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | 838 |
---|---|
container_issue | 1 |
container_start_page | 822 |
container_title | IEEE eTransactions on network and service management |
container_volume | 18 |
creator | Jirsik, Tomas Velan, Petr |
description | An analysis of a host behavior is an essential key for modern network management and security. A robust behavior profile enables the network managers to detect anomalies with high accuracy, predict the host behavior, or group host to clusters for better management. Hence, host profiling methods attract the interest of many researchers, and novel methods for host profiling are being introduced. However, these methods are frequently developed on preprocessed and small datasets. Therefore, they do not reflect the real-world artifacts of the host profiling, such as missing observations, temporal patterns, or variability in the profile characteristics in time. To provide the needed insight into the artifacts of host profiling in real-world settings, we present a study of the host behavior in a network conducted on a one-year-long real-world network dataset. In the study, we inspect the availability of the data for host profiling, identify the temporal patterns in host behavior, introduce a method for stable labeling of the hosts, and assess the variability of the host characteristics in the course of the year using the coefficient of variance. Moreover, we make the one-year dataset containing nine characteristics used for host behavior analysis available for public use and further research, including selected use cases representing host profiling caveats. We also share the record of analysis presented in the paper. |
doi_str_mv | 10.1109/TNSM.2020.3036528 |
format | Article |
fullrecord | <record><control><sourceid>proquest_cross</sourceid><recordid>TN_cdi_proquest_journals_2501322616</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>9250634</ieee_id><sourcerecordid>2501322616</sourcerecordid><originalsourceid>FETCH-LOGICAL-c336t-e1176d42d259fa24be462395d3492f8c196753ae3c58cc1c8e01a5557abcbb323</originalsourceid><addsrcrecordid>eNpNkDFPwzAQhS0EEqXwAxBLJOYEny92YjaogCKVdmgZmCzHuYgU2hQ7AfXfk6oVYro3fO-d9DF2CTwB4PpmMZ2_JIILniBHJUV-xAagUcSpxOz4Xz5lZyEsOZc5aDFgMG5CG93Tu_2uGx_V62jUrDZdSz6aUvvT-I_baLam-I2sj-ZtV27P2UllPwNdHO6QvT4-LEbjeDJ7eh7dTWKHqNqYADJVpqIUUldWpAWlSqCWJaZaVLkDrTKJltDJ3DlwOXGwUsrMFq4oUOCQXe93N7756ii0Ztl0ft2_NEJyQCEUqJ6CPeV8E4Knymx8vbJ-a4CbnRmzM2N2ZszBTN-52ndqIvrjdb-qMMVf6NBdGQ</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>2501322616</pqid></control><display><type>article</type><title>Host Behavior in Computer Network: One-Year Study</title><source>IEEE Electronic Library (IEL)</source><creator>Jirsik, Tomas ; Velan, Petr</creator><creatorcontrib>Jirsik, Tomas ; Velan, Petr</creatorcontrib><description>An analysis of a host behavior is an essential key for modern network management and security. A robust behavior profile enables the network managers to detect anomalies with high accuracy, predict the host behavior, or group host to clusters for better management. Hence, host profiling methods attract the interest of many researchers, and novel methods for host profiling are being introduced. However, these methods are frequently developed on preprocessed and small datasets. Therefore, they do not reflect the real-world artifacts of the host profiling, such as missing observations, temporal patterns, or variability in the profile characteristics in time. To provide the needed insight into the artifacts of host profiling in real-world settings, we present a study of the host behavior in a network conducted on a one-year-long real-world network dataset. In the study, we inspect the availability of the data for host profiling, identify the temporal patterns in host behavior, introduce a method for stable labeling of the hosts, and assess the variability of the host characteristics in the course of the year using the coefficient of variance. Moreover, we make the one-year dataset containing nine characteristics used for host behavior analysis available for public use and further research, including selected use cases representing host profiling caveats. We also share the record of analysis presented in the paper.</description><identifier>ISSN: 1932-4537</identifier><identifier>EISSN: 1932-4537</identifier><identifier>DOI: 10.1109/TNSM.2020.3036528</identifier><identifier>CODEN: ITNSC4</identifier><language>eng</language><publisher>New York: IEEE</publisher><subject>Anomalies ; Business ; clustering ; Computer networks ; Computer science ; Datasets ; host profiling ; IP networks ; Labeling ; netflow ; Network measurement ; Security ; Stability analysis ; temporal patterns ; Variability</subject><ispartof>IEEE eTransactions on network and service management, 2021-03, Vol.18 (1), p.822-838</ispartof><rights>Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2021</rights><lds50>peer_reviewed</lds50><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c336t-e1176d42d259fa24be462395d3492f8c196753ae3c58cc1c8e01a5557abcbb323</citedby><cites>FETCH-LOGICAL-c336t-e1176d42d259fa24be462395d3492f8c196753ae3c58cc1c8e01a5557abcbb323</cites><orcidid>0000-0002-2824-4299 ; 0000-0002-6180-1069</orcidid></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/9250634$$EHTML$$P50$$Gieee$$Hfree_for_read</linktohtml><link.rule.ids>314,776,780,792,27901,27902,54733</link.rule.ids></links><search><creatorcontrib>Jirsik, Tomas</creatorcontrib><creatorcontrib>Velan, Petr</creatorcontrib><title>Host Behavior in Computer Network: One-Year Study</title><title>IEEE eTransactions on network and service management</title><addtitle>T-NSM</addtitle><description>An analysis of a host behavior is an essential key for modern network management and security. A robust behavior profile enables the network managers to detect anomalies with high accuracy, predict the host behavior, or group host to clusters for better management. Hence, host profiling methods attract the interest of many researchers, and novel methods for host profiling are being introduced. However, these methods are frequently developed on preprocessed and small datasets. Therefore, they do not reflect the real-world artifacts of the host profiling, such as missing observations, temporal patterns, or variability in the profile characteristics in time. To provide the needed insight into the artifacts of host profiling in real-world settings, we present a study of the host behavior in a network conducted on a one-year-long real-world network dataset. In the study, we inspect the availability of the data for host profiling, identify the temporal patterns in host behavior, introduce a method for stable labeling of the hosts, and assess the variability of the host characteristics in the course of the year using the coefficient of variance. Moreover, we make the one-year dataset containing nine characteristics used for host behavior analysis available for public use and further research, including selected use cases representing host profiling caveats. We also share the record of analysis presented in the paper.</description><subject>Anomalies</subject><subject>Business</subject><subject>clustering</subject><subject>Computer networks</subject><subject>Computer science</subject><subject>Datasets</subject><subject>host profiling</subject><subject>IP networks</subject><subject>Labeling</subject><subject>netflow</subject><subject>Network measurement</subject><subject>Security</subject><subject>Stability analysis</subject><subject>temporal patterns</subject><subject>Variability</subject><issn>1932-4537</issn><issn>1932-4537</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2021</creationdate><recordtype>article</recordtype><sourceid>ESBDL</sourceid><sourceid>RIE</sourceid><recordid>eNpNkDFPwzAQhS0EEqXwAxBLJOYEny92YjaogCKVdmgZmCzHuYgU2hQ7AfXfk6oVYro3fO-d9DF2CTwB4PpmMZ2_JIILniBHJUV-xAagUcSpxOz4Xz5lZyEsOZc5aDFgMG5CG93Tu_2uGx_V62jUrDZdSz6aUvvT-I_baLam-I2sj-ZtV27P2UllPwNdHO6QvT4-LEbjeDJ7eh7dTWKHqNqYADJVpqIUUldWpAWlSqCWJaZaVLkDrTKJltDJ3DlwOXGwUsrMFq4oUOCQXe93N7756ii0Ztl0ft2_NEJyQCEUqJ6CPeV8E4Knymx8vbJ-a4CbnRmzM2N2ZszBTN-52ndqIvrjdb-qMMVf6NBdGQ</recordid><startdate>202103</startdate><enddate>202103</enddate><creator>Jirsik, Tomas</creator><creator>Velan, Petr</creator><general>IEEE</general><general>The Institute of Electrical and Electronics Engineers, Inc. (IEEE)</general><scope>97E</scope><scope>ESBDL</scope><scope>RIA</scope><scope>RIE</scope><scope>AAYXX</scope><scope>CITATION</scope><orcidid>https://orcid.org/0000-0002-2824-4299</orcidid><orcidid>https://orcid.org/0000-0002-6180-1069</orcidid></search><sort><creationdate>202103</creationdate><title>Host Behavior in Computer Network: One-Year Study</title><author>Jirsik, Tomas ; Velan, Petr</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c336t-e1176d42d259fa24be462395d3492f8c196753ae3c58cc1c8e01a5557abcbb323</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2021</creationdate><topic>Anomalies</topic><topic>Business</topic><topic>clustering</topic><topic>Computer networks</topic><topic>Computer science</topic><topic>Datasets</topic><topic>host profiling</topic><topic>IP networks</topic><topic>Labeling</topic><topic>netflow</topic><topic>Network measurement</topic><topic>Security</topic><topic>Stability analysis</topic><topic>temporal patterns</topic><topic>Variability</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Jirsik, Tomas</creatorcontrib><creatorcontrib>Velan, Petr</creatorcontrib><collection>IEEE All-Society Periodicals Package (ASPP) 2005-present</collection><collection>IEEE Open Access Journals</collection><collection>IEEE All-Society Periodicals Package (ASPP) 1998-Present</collection><collection>IEEE Electronic Library (IEL)</collection><collection>CrossRef</collection><jtitle>IEEE eTransactions on network and service management</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Jirsik, Tomas</au><au>Velan, Petr</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Host Behavior in Computer Network: One-Year Study</atitle><jtitle>IEEE eTransactions on network and service management</jtitle><stitle>T-NSM</stitle><date>2021-03</date><risdate>2021</risdate><volume>18</volume><issue>1</issue><spage>822</spage><epage>838</epage><pages>822-838</pages><issn>1932-4537</issn><eissn>1932-4537</eissn><coden>ITNSC4</coden><abstract>An analysis of a host behavior is an essential key for modern network management and security. A robust behavior profile enables the network managers to detect anomalies with high accuracy, predict the host behavior, or group host to clusters for better management. Hence, host profiling methods attract the interest of many researchers, and novel methods for host profiling are being introduced. However, these methods are frequently developed on preprocessed and small datasets. Therefore, they do not reflect the real-world artifacts of the host profiling, such as missing observations, temporal patterns, or variability in the profile characteristics in time. To provide the needed insight into the artifacts of host profiling in real-world settings, we present a study of the host behavior in a network conducted on a one-year-long real-world network dataset. In the study, we inspect the availability of the data for host profiling, identify the temporal patterns in host behavior, introduce a method for stable labeling of the hosts, and assess the variability of the host characteristics in the course of the year using the coefficient of variance. Moreover, we make the one-year dataset containing nine characteristics used for host behavior analysis available for public use and further research, including selected use cases representing host profiling caveats. We also share the record of analysis presented in the paper.</abstract><cop>New York</cop><pub>IEEE</pub><doi>10.1109/TNSM.2020.3036528</doi><tpages>17</tpages><orcidid>https://orcid.org/0000-0002-2824-4299</orcidid><orcidid>https://orcid.org/0000-0002-6180-1069</orcidid><oa>free_for_read</oa></addata></record> |
fulltext | fulltext |
identifier | ISSN: 1932-4537 |
ispartof | IEEE eTransactions on network and service management, 2021-03, Vol.18 (1), p.822-838 |
issn | 1932-4537 1932-4537 |
language | eng |
recordid | cdi_proquest_journals_2501322616 |
source | IEEE Electronic Library (IEL) |
subjects | Anomalies Business clustering Computer networks Computer science Datasets host profiling IP networks Labeling netflow Network measurement Security Stability analysis temporal patterns Variability |
title | Host Behavior in Computer Network: One-Year Study |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-02-12T22%3A54%3A42IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Host%20Behavior%20in%20Computer%20Network:%20One-Year%20Study&rft.jtitle=IEEE%20eTransactions%20on%20network%20and%20service%20management&rft.au=Jirsik,%20Tomas&rft.date=2021-03&rft.volume=18&rft.issue=1&rft.spage=822&rft.epage=838&rft.pages=822-838&rft.issn=1932-4537&rft.eissn=1932-4537&rft.coden=ITNSC4&rft_id=info:doi/10.1109/TNSM.2020.3036528&rft_dat=%3Cproquest_cross%3E2501322616%3C/proquest_cross%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=2501322616&rft_id=info:pmid/&rft_ieee_id=9250634&rfr_iscdi=true |