Towards Anomaly Traffic Detection with Causal Interpretability Methods

被引:0
|
作者
Zeng, Zengri [1 ,3 ,4 ]
Zhao, Baokang [2 ]
Liu, Xuhui [3 ]
Deng, Xiaoheng [4 ]
机构
[1] Hunan Univ Humanities Sci & Technol, Loudi, Hunan, Peoples R China
[2] Natl Univ Def Technol, Changsha, Hunan, Peoples R China
[3] Hunan Valin Lianyuan Iron, Loudi, Hunan, Peoples R China
[4] Cent South Univ, Changsha, Hunan, Peoples R China
关键词
network security; anomaly traffic detection; causal interpretability; SCM pruning;
D O I
10.1007/978-981-97-3890-8_7
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The large non-independent and identically distributed (N-IID) samples result in a lack of stability and causal interpretability in the detection results of existing detectionmethods. To solve these problems, we propose an abnormal traffic detectionmethod based on causal interpretability. Thismethod first removes the false associations between features through Fourier feature transformation. Subsequently, a structural causal model (SCM) is constructed and pruned based on causal effects, and counterfactual diagnosis, thereby restoring the causal relationship between abnormal labels and traffic features. Verification on the CICIDS2019 and ToN_IoT datasets shows that this method effectively removes noise features, redundant information and false associations to effectively restore the causal relationships between network attacks and abnormal traffic features, ensuring good detection precision, guaranteeing detection stability when traffic is polluted and causal interpretability for network anomalies.
引用
收藏
页码:84 / 98
页数:15
相关论文
共 50 条
  • [1] Parametric Methods for Anomaly Detection in Aggregate Traffic
    Thatte, Gautam
    Mitra, Urbashi
    Heidemann, John
    IEEE-ACM TRANSACTIONS ON NETWORKING, 2011, 19 (02) : 512 - 525
  • [2] Towards online anomaly detection by combining multiple detection methods and Storm
    Wang, Ziyu
    Yang, Jiahai
    Zhang, Hui
    Li, Chenxi
    Zhang, Shize
    Wang, Hui
    NOMS 2016 - 2016 IEEE/IFIP NETWORK OPERATIONS AND MANAGEMENT SYMPOSIUM, 2016, : 804 - 807
  • [3] Towards an immunity-based anomaly detection system for network traffic
    Okamoto, Takeshi
    Ishida, Yoshiteru
    INTERNATIONAL JOURNAL OF KNOWLEDGE-BASED AND INTELLIGENT ENGINEERING SYSTEMS, 2011, 15 (04) : 215 - 225
  • [4] Towards an immunity-based anomaly detection system for network traffic
    Okamoto, Takeshi
    Ishida, Yoshiteru
    KNOWLEDGE-BASED INTELLIGENT INFORMATION AND ENGINEERING SYSTEMS, PT 2, PROCEEDINGS, 2006, 4252 : 123 - 130
  • [5] A self-supervised anomaly detection algorithm with interpretability
    Wu, Zhichao
    Yang, Xin
    Wei, Xiaopeng
    Yuan, Peijun
    Zhang, Yuanping
    Bai, Jianming
    EXPERT SYSTEMS WITH APPLICATIONS, 2024, 237
  • [6] Analysis of Anomaly Detection and Identification Methods in 5G Traffic
    Radivilova, Tamara
    Kirichenko, Lyudmyla
    Lemeshko, Oleksandr
    Ageyev, Dmytro
    Mulesa, Oksana
    Ilkov, Andrii
    PROCEEDINGS OF THE 11TH IEEE INTERNATIONAL CONFERENCE ON INTELLIGENT DATA ACQUISITION AND ADVANCED COMPUTING SYSTEMS: TECHNOLOGY AND APPLICATIONS (IDAACS'2021), VOL 2, 2021, : 1108 - 1113
  • [7] The methods of network traffic statistical anomaly detection based on Network processor
    Yun, Li
    Ge, Renhua
    Li, Jinghua
    IITAW: 2009 THIRD INTERNATIONAL SYMPOSIUM ON INTELLIGENT INFORMATION TECHNOLOGY APPLICATIONS WORKSHOPS, 2009, : 54 - +
  • [8] Anomaly detection in network traffic
    Duraj, Agnieszka
    Bucki, Pawel
    Drajling, Aleksander
    Makrocki, Robert
    Sipinski, Mateusz
    PRZEGLAD ELEKTROTECHNICZNY, 2022, 98 (12): : 205 - 208
  • [9] Traffic Camera Anomaly Detection
    Wang, Yuan-Kai
    Fan, Ching-Tang
    Chen, Jian-Fu
    2014 22ND INTERNATIONAL CONFERENCE ON PATTERN RECOGNITION (ICPR), 2014, : 4642 - 4647
  • [10] Anomaly detection in SMTP traffic
    Luo, Hao
    Fang, Binxing
    Yun, Xiaochun
    THIRD INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY: NEW GENERATIONS, PROCEEDINGS, 2006, : 408 - +