SlideShare a Scribd company logo
Anomaly Detection
iwanaga
Who am I
@quake_alert
@quake_alert_en
@quake_alert_fr
@quake_alert_kr
Yoshihiro Iwanaga
Motivation for detecting
anomaly
Traditional system monitoring
• process existence
• ping, http, tcp response
• disk usage
→ “fixed” rule / threshold
Motivation for detecting
anomaly
Notice something out of ordinary
• network traffic is heavier than usual
• number of login try is obviously larger
• a colleague is strangely gracious today
→ Unusual behaviors; Indications of fault.
Such info helps
preventing service degrading in advance!!
but rule/threshold vary with service, host, client, time…
key to detect anomaly
usual unusual
Watch differences b/w
e.g. Network Traffic
Mon Tue Wed Thu Fri
traffic
time
Superimpose 24 hour plot
Traffic at 15:00 on workday
is about 1.2 Gbps
traffic
time
Periodicity!!
mean
mean - 3σ
mean + 3σ
amount of dispersion from mean
Acceptable “range”
→ e.g. Acceptable range of traffic at 15:00 on workday is
1.01 to 1.38 Gbps
Case examples
DDoS
partial
hardware failure
Traffic
number of mail passed spam filterspam rate
e-mail
Applied a wrong spam rule
However
Reality is not that simple…
人生楽ありゃ苦もあるさ
涙の後には虹も出る
歩いてゆくんだしっかりと
自分の道をふみしめて
山上路夫
downloading large files
mass e-mail sending
“Traffic spike” happens so frequently
Frequent false-positive alerting will be
“cry-wolf” system…
heuristic filtering
In usual, traffic gets cool down
within 15 minutes
notify engineers
if anomaly continues more than 15 minutes
Engineers’ knowledge is gold mine
for better algorithm 
→ one practical example:

More Related Content

PPTX
Resource Monitoring
PDF
Drilling Down Into DNS DDoS
PDF
Donatas Mažionis, Building low latency web APIs
PPTX
Water Torture: A Slow Drip DNS DDoS Attack on QTNet by Kei Nishida [APRICOT 2...
PPT
Understanding
PDF
Ariu - Workshop on Artificial Intelligence and Security - 2011
PPT
Network anomaly detection based on statistical
PDF
Mr201306 machine learning for computer security
Resource Monitoring
Drilling Down Into DNS DDoS
Donatas Mažionis, Building low latency web APIs
Water Torture: A Slow Drip DNS DDoS Attack on QTNet by Kei Nishida [APRICOT 2...
Understanding
Ariu - Workshop on Artificial Intelligence and Security - 2011
Network anomaly detection based on statistical
Mr201306 machine learning for computer security

Viewers also liked (19)

PDF
Machine learning approach to anomaly detection in cyber security
PPTX
Anomaly Detection using Spark MLlib and Spark Streaming
PPTX
Anomaly Detection Via PCA
PDF
Jim Geovedi - Machine Learning for Cybersecurity
PDF
Sharing is Caring: Understanding and Measuring Threat Intelligence Sharing Ef...
PDF
Computer security using machine learning
PDF
Computer security - A machine learning approach
PDF
Anomaly Detection in Deep Learning (Updated)
PPTX
Anomaly Detection with Apache Spark
PPTX
Anomaly detection in deep learning (Updated) English
PDF
Anomaly Detection
PDF
Anomaly detection in deep learning
PPTX
Anomaly detection, part 1
PDF
Strata 2014 Anomaly Detection
PPTX
Chapter 10 Anomaly Detection
PPTX
機械学習を用いた異常検知入門
PPTX
Machine Learning in Information Security by Mohammed Zuber
PPTX
Anomaly Detection
PDF
Detecting Trends
Machine learning approach to anomaly detection in cyber security
Anomaly Detection using Spark MLlib and Spark Streaming
Anomaly Detection Via PCA
Jim Geovedi - Machine Learning for Cybersecurity
Sharing is Caring: Understanding and Measuring Threat Intelligence Sharing Ef...
Computer security using machine learning
Computer security - A machine learning approach
Anomaly Detection in Deep Learning (Updated)
Anomaly Detection with Apache Spark
Anomaly detection in deep learning (Updated) English
Anomaly Detection
Anomaly detection in deep learning
Anomaly detection, part 1
Strata 2014 Anomaly Detection
Chapter 10 Anomaly Detection
機械学習を用いた異常検知入門
Machine Learning in Information Security by Mohammed Zuber
Anomaly Detection
Detecting Trends
Ad

Similar to Anomaly Detection by Mean and Standard Deviation (LT at AQ) (20)

PDF
Logging makes perfect - Riemann, Elasticsearch and friends
PPTX
Traffic profiles, congestion and network performance
PPT
Web security
PPT
networking point to point networking is the best .2024.ppt
PPTX
Velocity 2016 Speaking Session - Using Machine Learning to Determine Drivers ...
PPTX
Using machine learning to determine drivers of bounce and conversion
PDF
Datastream management system1
PPTX
anti-ddos GNTC based on P4 /BIH
PPTX
Anomaly Detection and You
PDF
Lecture6 introduction to data streams
PDF
Network Forensics and Practical Packet Analysis
PPT
Complete notes security
PDF
Resilient Design Using Queue Theory
PDF
6 Scope & 7 Live Data Collection
PPTX
cyber-warfare.pptx
PDF
CNIT 152: 6. Scope & 7. Live Data Collection
PPTX
DoS or DDoS attack
PPT
Myles firewalls
PPTX
Splunk live! Customer Presentation – Prelert
PDF
Normalizing Empire's Traffic to Evade Anomaly-Based IDS
Logging makes perfect - Riemann, Elasticsearch and friends
Traffic profiles, congestion and network performance
Web security
networking point to point networking is the best .2024.ppt
Velocity 2016 Speaking Session - Using Machine Learning to Determine Drivers ...
Using machine learning to determine drivers of bounce and conversion
Datastream management system1
anti-ddos GNTC based on P4 /BIH
Anomaly Detection and You
Lecture6 introduction to data streams
Network Forensics and Practical Packet Analysis
Complete notes security
Resilient Design Using Queue Theory
6 Scope & 7 Live Data Collection
cyber-warfare.pptx
CNIT 152: 6. Scope & 7. Live Data Collection
DoS or DDoS attack
Myles firewalls
Splunk live! Customer Presentation – Prelert
Normalizing Empire's Traffic to Evade Anomaly-Based IDS
Ad

More from Yoshihiro Iwanaga (11)

PDF
Arduino and johnny-five, creating IoT device in easiest way
PDF
Node.js Tutorial at Hiroshima
PDF
Web Technology for Hardware Control (html5 conference 2015)
PPTX
Mongodb World 2014
PDF
http2 最速実装 v2
PPTX
JavaScript と Arduino でオリジナルデバイスを作ろう
PDF
Anomaly detection using correlations of load
PPTX
HOTATE (Developers Summit 2012)
PPTX
WebComponents LT at AQ
PPTX
20130725 LT at AQ
Arduino and johnny-five, creating IoT device in easiest way
Node.js Tutorial at Hiroshima
Web Technology for Hardware Control (html5 conference 2015)
Mongodb World 2014
http2 最速実装 v2
JavaScript と Arduino でオリジナルデバイスを作ろう
Anomaly detection using correlations of load
HOTATE (Developers Summit 2012)
WebComponents LT at AQ
20130725 LT at AQ

Recently uploaded (20)

PPTX
Cloud computing and distributed systems.
PDF
Chapter 3 Spatial Domain Image Processing.pdf
PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
PPTX
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
PPTX
A Presentation on Artificial Intelligence
PPT
Teaching material agriculture food technology
PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
PDF
Spectral efficient network and resource selection model in 5G networks
PDF
Dropbox Q2 2025 Financial Results & Investor Presentation
PPTX
20250228 LYD VKU AI Blended-Learning.pptx
PDF
NewMind AI Monthly Chronicles - July 2025
PDF
Bridging biosciences and deep learning for revolutionary discoveries: a compr...
PDF
Per capita expenditure prediction using model stacking based on satellite ima...
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PDF
Review of recent advances in non-invasive hemoglobin estimation
DOCX
The AUB Centre for AI in Media Proposal.docx
PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
PDF
Shreyas Phanse Resume: Experienced Backend Engineer | Java • Spring Boot • Ka...
PDF
NewMind AI Weekly Chronicles - August'25 Week I
Cloud computing and distributed systems.
Chapter 3 Spatial Domain Image Processing.pdf
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
A Presentation on Artificial Intelligence
Teaching material agriculture food technology
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
Diabetes mellitus diagnosis method based random forest with bat algorithm
Spectral efficient network and resource selection model in 5G networks
Dropbox Q2 2025 Financial Results & Investor Presentation
20250228 LYD VKU AI Blended-Learning.pptx
NewMind AI Monthly Chronicles - July 2025
Bridging biosciences and deep learning for revolutionary discoveries: a compr...
Per capita expenditure prediction using model stacking based on satellite ima...
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
Review of recent advances in non-invasive hemoglobin estimation
The AUB Centre for AI in Media Proposal.docx
Digital-Transformation-Roadmap-for-Companies.pptx
Shreyas Phanse Resume: Experienced Backend Engineer | Java • Spring Boot • Ka...
NewMind AI Weekly Chronicles - August'25 Week I

Anomaly Detection by Mean and Standard Deviation (LT at AQ)