Enhancing Network Security Through Granular Computing: A Clustering-by-Time Approach to NetFlow Traffic Analysis

被引:0
作者
Komisarek, Mikolaj [1 ]
Pawlicki, Marek [1 ,2 ]
D'Antonio, Salvatore [3 ]
Kozik, Rafal [1 ,2 ]
Pawlicka, Aleksandra [1 ,4 ]
Choras, Michal [1 ,2 ]
机构
[1] ITTI Sp Zoo, Poznan, Poland
[2] Bydgoszcz Univ Sci & Technol, Bydgoszcz, Poland
[3] Naples Univ Parthenope, Naples, Italy
[4] Univ Warsaw, Warsaw, Poland
来源
19TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY, AND SECURITY, ARES 2024 | 2024年
关键词
feature engineering; granular computing; NetFlow; network intrusion detection;
D O I
10.1145/3664476.3670882
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This paper presents a study of the effect of the size of the time window from which network features are derived on the predictive ability of a Random Forest classifier implemented as a network intrusion detection component. The network data is processed using granular computing principles, gradually increasing the time windows to allow the detection algorithm to find patterns in the data at different levels of granularity. Experiments were conducted iteratively with time windows ranging in size from 2 to 1024 seconds. Each iteration involved time-based clustering of the data, followed by splitting into training and test sets at a ratio of 67% - 33%. The Random Forest algorithm was applied as part of a 10-fold cross-validation. Assessments included standard detection metrics: accuracy, precision, F1 score, BCC, MCC and recall. The results show a statistically significant improvement in the detection of cyber attacks in network traffic with a larger time window size (p-value 0.001953125). These results highlight the effectiveness of using longer time intervals in network data analysis, resulting in increased anomaly detection.
引用
收藏
页数:8
相关论文
共 20 条
  • [1] Network intrusion detection system: A systematic study of machine learning and deep learning approaches
    Ahmad, Zeeshan
    Shahid Khan, Adnan
    Wai Shiang, Cheah
    Abdullah, Johari
    Ahmad, Farhan
    [J]. TRANSACTIONS ON EMERGING TELECOMMUNICATIONS TECHNOLOGIES, 2021, 32 (01)
  • [2] IoBT Intrusion Detection System using Machine Learning
    Alkanjr, Basmh
    Alshammari, Thamer
    [J]. 2023 IEEE 13TH ANNUAL COMPUTING AND COMMUNICATION WORKSHOP AND CONFERENCE, CCWC, 2023, : 886 - 892
  • [3] Security Analysis of DDoS Attacks Using Machine Learning Algorithms in Networks Traffic
    Alzahrani, Rami J.
    Alzahrani, Ahmed
    [J]. ELECTRONICS, 2021, 10 (23)
  • [4] Bargiela A., 2022, Handbook on Computer Learning and Intelligence: Deep Learning, Intelligent Control and Evolutionary Computation, V2, P97
  • [5] Biau G, 2012, Arxiv, DOI arXiv:1005.0208
  • [6] Research on Security Anomaly Detection for Big Data Platforms Based on Quantum Optimization Clustering
    Deng, Lijuan
    Wan, Long
    Guo, Jian
    [J]. MATHEMATICAL PROBLEMS IN ENGINEERING, 2022, 2022
  • [7] He Qian, 2021, 2021 INT C NETW COMM, P50, DOI [10.1109/NetCIT54147.2021.00017, DOI 10.1109/NETCIT54147.2021.00017]
  • [8] Feature Selection of Denial-of-Service Attacks Using Entropy and Granular Computing
    Khan, Suleman
    Gani, Abdullah
    Wahab, Ainuddin Wahid Abdul
    Singh, Prem Kumar
    [J]. ARABIAN JOURNAL FOR SCIENCE AND ENGINEERING, 2018, 43 (02) : 499 - 508
  • [9] Network Anomaly Detection Using a Graph Neural Network
    Kisanga, Patrice
    Woungang, Isaac
    Traore, Issa
    Carvalho, Glaucio H. S.
    [J]. 2023 INTERNATIONAL CONFERENCE ON COMPUTING, NETWORKING AND COMMUNICATIONS, ICNC, 2023, : 61 - 65
  • [10] How to Effectively Collect and Process Network Data for Intrusion Detection?
    Komisarek, Mikolaj
    Pawlicki, Marek
    Kozik, Rafal
    Holubowicz, Witold
    Choras, Michal
    [J]. ENTROPY, 2021, 23 (11)