MSCA: An Unsupervised Anomaly Detection System for Network Security in Backbone Network

被引:4
作者
Liu, Yating [1 ]
Gu, Yuantao [2 ]
Shen, Xinyue [1 ]
Liao, Qingmin [1 ]
Yu, Quan [3 ]
机构
[1] Tsinghua Univ, Tsinghua Shenzhen Int Grad Sch, Shenzhen 518055, Peoples R China
[2] Tsinghua Univ, Dept Elect & Engn, Beijing 100084, Peoples R China
[3] Peng Cheng Lab, Shenzhen 518055, Peoples R China
来源
IEEE TRANSACTIONS ON NETWORK SCIENCE AND ENGINEERING | 2023年 / 10卷 / 01期
基金
中国国家自然科学基金;
关键词
Anomaly detection; Feature extraction; IP networks; Principal component analysis; Standards; Hash functions; Clustering algorithms; association rule mining; backbone network; clustering; random projections; sketches; traffic anomalies; INTRUSION DETECTION; RANDOM-FORESTS; ENTROPY; PCA;
D O I
10.1109/TNSE.2022.3206353
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
Anomaly detection is a crucial topic in network security which refers to automatically mining known and unknown attacks or threats. Many detectors have been proposed in the last decade. Nonetheless, a practical solution, which is able to provide a high True Positive Rate (TPR) with an acceptable False Positive Rate (FPR) without any prior information, is still challenging due to the complexity and variability of anomaly pattern. In this article, we propose a novel unsupervised detection system called MSCA which applies multiple sketches, K-means++ unsupervised clustering, and association rule mining to detect traffic anomalies and analyze anomalous features and correlations. It can blindly identify known and unknown traffic anomalies without any labeled traffic or prior signatures about data distribution. Rich traffic data is first aggregated and compacted to traffic flows by sketches, and further detected by the combination of clustering algorithm and voting strategy. Then association rule mining is finally utilized to find the anomalous frequent item-sets and association rules. Numerical experiments on MAWILAB datasets demonstrate that the proposed detection method outperforms other reference unsupervised detection methods. It achieves an accuracy of 99.86%, 99.97%, 97.08%, and 95.19% in overall four detection types including IP and port of source and destination.
引用
收藏
页码:223 / 238
页数:16
相关论文
共 43 条
  • [1] Arthur D, 2007, PROCEEDINGS OF THE EIGHTEENTH ANNUAL ACM-SIAM SYMPOSIUM ON DISCRETE ALGORITHMS, P1027
  • [2] Bhuyan MH, 2014, COMPUT INFORM, V33, P1
  • [3] Anomaly Extraction in Backbone Networks Using Association Rules
    Brauckhoff, Daniela
    Dimitropoulos, Xenofontas
    Wagner, Arno
    Salamatian, Kave
    [J]. IEEE-ACM TRANSACTIONS ON NETWORKING, 2012, 20 (06) : 1788 - 1799
  • [4] An information-theoretic method for the detection of anomalies in network traffic
    Callegari, Christian
    Giordano, Stefano
    Pagano, Michele
    [J]. COMPUTERS & SECURITY, 2017, 70 : 351 - 365
  • [5] Chen Z., 2017, PROC WIRELESS OPT CO, P1
  • [6] Detection of network anomalies using Improved-MSPCA with sketches
    Chen, Zhaomin
    Yeo, Chai Kiat
    Lee, Bu Sung
    Lau, Chiew Tong
    [J]. COMPUTERS & SECURITY, 2017, 65 : 314 - 328
  • [7] Dewaele G., 2007, Proceedings of ACM SIGCOMM Workshop on Large-Scale Attack Defense, P145
  • [8] FAST-ODT: A Lightweight Outlier Detection Scheme for Categorical Data Sets
    Du, Hongwei
    Ye, Qiang
    Sun, Zhipeng
    Liu, Chuang
    Xu, Wen
    [J]. IEEE TRANSACTIONS ON NETWORK SCIENCE AND ENGINEERING, 2021, 8 (01): : 13 - 24
  • [9] A novel feature-selection approach based on the cuttlefish optimization algorithm for intrusion detection systems
    Eesa, Adel Sabry
    Orman, Zeynep
    Brifcani, Adnan Mohsin Abdulazeez
    [J]. EXPERT SYSTEMS WITH APPLICATIONS, 2015, 42 (05) : 2670 - 2679
  • [10] Mining network data for intrusion detection through combining SVMs with ant colony networks
    Feng, Wenying
    Zhang, Qinglei
    Hu, Gongzhu
    Huang, Jimmy Xiangji
    [J]. FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2014, 37 : 127 - 140