MSCA: An Unsupervised Anomaly Detection System for Network Security in Backbone Network

被引:4
作者
Liu, Yating [1 ]
Gu, Yuantao [2 ]
Shen, Xinyue [1 ]
Liao, Qingmin [1 ]
Yu, Quan [3 ]
机构
[1] Tsinghua Univ, Tsinghua Shenzhen Int Grad Sch, Shenzhen 518055, Peoples R China
[2] Tsinghua Univ, Dept Elect & Engn, Beijing 100084, Peoples R China
[3] Peng Cheng Lab, Shenzhen 518055, Peoples R China
来源
IEEE TRANSACTIONS ON NETWORK SCIENCE AND ENGINEERING | 2023年 / 10卷 / 01期
基金
中国国家自然科学基金;
关键词
Anomaly detection; Feature extraction; IP networks; Principal component analysis; Standards; Hash functions; Clustering algorithms; association rule mining; backbone network; clustering; random projections; sketches; traffic anomalies; INTRUSION DETECTION; RANDOM-FORESTS; ENTROPY; PCA;
D O I
10.1109/TNSE.2022.3206353
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
Anomaly detection is a crucial topic in network security which refers to automatically mining known and unknown attacks or threats. Many detectors have been proposed in the last decade. Nonetheless, a practical solution, which is able to provide a high True Positive Rate (TPR) with an acceptable False Positive Rate (FPR) without any prior information, is still challenging due to the complexity and variability of anomaly pattern. In this article, we propose a novel unsupervised detection system called MSCA which applies multiple sketches, K-means++ unsupervised clustering, and association rule mining to detect traffic anomalies and analyze anomalous features and correlations. It can blindly identify known and unknown traffic anomalies without any labeled traffic or prior signatures about data distribution. Rich traffic data is first aggregated and compacted to traffic flows by sketches, and further detected by the combination of clustering algorithm and voting strategy. Then association rule mining is finally utilized to find the anomalous frequent item-sets and association rules. Numerical experiments on MAWILAB datasets demonstrate that the proposed detection method outperforms other reference unsupervised detection methods. It achieves an accuracy of 99.86%, 99.97%, 97.08%, and 95.19% in overall four detection types including IP and port of source and destination.
引用
收藏
页码:223 / 238
页数:16
相关论文
共 43 条
  • [21] Mining anomalies using traffic feature distributions
    Lakhina, A
    Crovella, M
    Diot, C
    [J]. ACM SIGCOMM COMPUTER COMMUNICATION REVIEW, 2005, 35 (04) : 217 - 228
  • [22] Leung K., 2005, P 28 AUSTR COMP SCI, V38, P333
  • [23] Li X., 2006, P 6 ACM SIGCOMM C IN, P147, DOI DOI 10.1145/1177080.1177099
  • [24] Focal Loss for Dense Object Detection
    Lin, Tsung-Yi
    Goyal, Priya
    Girshick, Ross
    He, Kaiming
    Dollar, Piotr
    [J]. IEEE TRANSACTIONS ON PATTERN ANALYSIS AND MACHINE INTELLIGENCE, 2020, 42 (02) : 318 - 327
  • [25] Liu YT, 2018, 2018 IEEE DATA SCIENCE WORKSHOP (DSW), P31, DOI 10.1109/DSW.2018.8439923
  • [26] A random-forests-based classifier using class association rules and its application to an intrusion detection system
    Mabu, Shingo
    Gotoh, Shun
    Obayashi, Masanao
    Kuremoto, Takashi
    [J]. ARTIFICIAL LIFE AND ROBOTICS, 2016, 21 (03) : 371 - 377
  • [27] MAWILAB, 2014, NETW TRAFF AN CLASS
  • [28] Mazel J., 2011, Proceedings of the 7th International Conference on Network and Services Management, P73
  • [29] Hunting attacks in the dark: clustering and correlation analysis for unsupervised anomaly detection
    Mazel, Johan
    Casas, Pedro
    Fontugne, Romain
    Fukuda, Kensuke
    Owezarski, Philippe
    [J]. INTERNATIONAL JOURNAL OF NETWORK MANAGEMENT, 2015, 25 (05) : 283 - 305
  • [30] Mazel J, 2014, INT WIREL COMMUN, P30, DOI 10.1109/IWCMC.2014.6906328