ODR kommer att vara otillgängligt pga systemunderhåll onsdag 25 februari, 13:00 -15:00 (ca). Var vänlig och logga ut i god tid. // ODR will be unavailable due to system maintenance, Wednesday February 25, 13:00 - 15:00. Please log out in due time.
 

Scalable Anomaly-Based Network Intrusion Detection Using a Statistical Model and Data Sketches

dc.contributor.authorWickman, Albert
dc.contributor.authorRygaard, Daniel
dc.contributor.departmentChalmers tekniska högskola / Institutionen för data och informationstekniksv
dc.contributor.departmentChalmers University of Technology / Department of Computer Science and Engineeringen
dc.contributor.examinerPapatriantafilou, Marina
dc.contributor.supervisorDuvignau, Romaric
dc.date.accessioned2026-01-15T12:36:54Z
dc.date.issued2025
dc.date.submitted
dc.description.abstractThe growing frequency and complexity of cyber-attacks, especially Distributed Denial of Service (DDoS) attacks, has made protecting networks a major priority for businesses. Traditional Network Intrusion Detection Systems (NIDS) often struggle to cope with the large volumes of traffic seen in todays networks. These systems can be inefficient, often bogged down by high memory usage and significant computational demands. In this thesis, we propose a solution to these challenges by developing a more efficient, scalable system for detecting anomalies in network traffic. Our approach, the Baseline Configuration, combines a statistical model with probabilistic data structures, such as Count-Min Sketch and HeavyKeeper Sketch, to process high volumes of traffic in real-time while keeping resource consumption to a minimum. At the core of the Baseline Configuration is a statistical model built around the Interquartile Range (IQR) rule, which adjusts a detection threshold based on changes in network traffic. This helps the system identify abnormal patterns without flagging harmless variations as threats. To make the system even more responsive, we incorporate sliding window techniques, enabling it to continuously monitor traffic in small, manageable time segments. This ensures that the system remains accurate and efficient, even when network traffic spikes. The performance of the proposed system is tested using different datasets, including traffic data from Ericsson and the Center for Applied Internet Data Analysis (CAIDA). CAIDA is a well-known repository that provides real-world internet traffic traces commonly used for network research. The memory efficiency and processing times are compared to a Hash Map and Priority Queue (HP) Configuration, which uses these data structures instead of the Count-Min and HeavyKeeper sketch. Additionally, the detection accuracy and performance of the Baseline Configuration are compared to a Machine Learning (ML) Configuration which uses the Isolation Forest algorithm. The evaluation results demonstrate that the Baseline Configuration not only provides higher detection accuracy but also operates with significantly lower memory usage and faster response times than the other configurations. The systems ability to adapt to increasing traffic without compromising its performance makes it suitable for large-scale network environments. Through this work, it is shown that combining statistical models with data sketches provides a cost-effective, scalable, and efficient solution for real-time network intrusion detection for DDoS attacks.
dc.identifier.coursecodeDATX05
dc.identifier.urihttp://hdl.handle.net/20.500.12380/310882
dc.language.isoeng
dc.setspec.uppsokTechnology
dc.subjectCybersecurity
dc.subjectDistributed Denial of Service (DDoS) Attacks
dc.subjectNetwork v Intrusion Detection Systems (NIDS)
dc.subjectAnomaly Detection
dc.subjectStatistical Models
dc.subjectData Sketches
dc.subjectCount-Min Sketch
dc.subjectHeavyKeeper Sketch
dc.subjectInterquartile Range (IQR)
dc.subjectSliding Window Technique
dc.subjectReal-Time Traffic Monitoring
dc.subjectScalable Detection Systems
dc.subjectHash Map and Priority Queue Configuration
dc.subjectMemory Efficiency
dc.subjectProcessing Efficiency
dc.subjectMachine Learning (ML)
dc.subjectIsolation Forest
dc.subjectDetection Accuracy
dc.subjectResource Efficiency
dc.subjectTraffic Analysis
dc.subjectNetwork Traffic Fluctuations
dc.subjectLarge-Scale Network Security
dc.subjectReal-Time Network Intrusion Detection
dc.titleScalable Anomaly-Based Network Intrusion Detection Using a Statistical Model and Data Sketches
dc.type.degreeExamensarbete för masterexamensv
dc.type.degreeMaster's Thesisen
dc.type.uppsokH
local.programmeComputer systems and networks (MPCSN), MSc
local.programmeSoftware engineering and technology (MPSOF), MSc

Ladda ner

Original bundle

Visar 1 - 1 av 1
Hämtar...
Bild (thumbnail)
Namn:
CSE 25-116 AW DR.pdf
Storlek:
2.54 MB
Format:
Adobe Portable Document Format

License bundle

Visar 1 - 1 av 1
Hämtar...
Bild (thumbnail)
Namn:
license.txt
Storlek:
2.35 KB
Format:
Item-specific license agreed upon to submission
Beskrivning: