Evaluating Temporal and Structural Anomaly Detection Paradigms for DDoS Traffic

arXiv cs.LG / 4/21/2026

📰 NewsIdeas & Deep AnalysisModels & Research

Key Points

  • The paper argues that unsupervised DDoS detection for cloud-native 5G networks often relies on a single assumed traffic representation (temporal or structural) without validating which feature space fits the data.
  • It proposes a lightweight decision framework that selects temporal or structural features using two diagnostics: lag-1 autocorrelation of an aggregated flow signal and PCA cumulative explained variance.
  • If the diagnostics do not clearly indicate a better option, the framework intentionally does not make an unvalidated choice and instead leaves a hybrid strategy as a future fallback.
  • Experiments on two statistically distinct datasets using Isolation Forest, One-Class SVM, and KMeans find that structural features consistently perform as well as or better than temporal ones.
  • The results further show that the performance advantage of structural features grows as temporal dependence weakens in the traffic data.

Abstract

Unsupervised anomaly detection is widely used to detect Distributed Denial-of-Service (DDoS) attacks in cloud-native 5G networks, yet most studies assume a fixed traffic representation, either temporal or structural, without validating which feature space best matches the data. We propose a lightweight decision framework that prioritizes temporal or structural features before training, using two diagnostics: lag-1 autocorrelation of an aggregated flow signal and PCA cumulative explained variance. When the probes are inconclusive, the framework reserves a hybrid option as a future fallback rather than an empirically validated branch. Experiments on two statistically distinct datasets with Isolation Forest, One-Class SVM, and KMeans show that structural features consistently match or outperform temporal ones, with the performance gap widening as temporal dependence weakens.