An outlier ensemble for unsupervised anomaly detection in honeypots data

被引:5
作者
Boukela, Lynda [1 ]
Zhang, Gongxuan [1 ]
Bouzefrane, Samia [2 ]
Zhou, Junlong [1 ]
机构
[1] Nanjing Univ Sci & Technol, Sch Comp Sci & Engn, 200 Xiaolingwei St, Nanjing 210094, Peoples R China
[2] Conservatoire Natl Arts & Metiers, CEDRIC Lab, Paris, France
基金
中国国家自然科学基金;
关键词
Outlier ensembles; network security; anomaly detection; honeypots; FRAMEWORK;
D O I
10.3233/IDA-194656
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Nowadays, computers, as well as smart devices, are connected through communication networks making them more vulnerable to attacks. Honeypots are proposed as deception tools but usually used as part of a proactive defense strategy. Hence, this article demonstrates how honeypots data can be analyzed in an active defense strategy. Furthermore, anomaly detection based on unsupervised machine learning techniques allows to build autonomous systems and to detect unknown anomalies without the need for prior knowledge. However, the unsupervised techniques applied for honeypots data analysis do not value the advantages of these tools' data, particularly the high probability that they include a large number of previously unseen anomalies with unexpected and diverse patterns. Therefore, in the present work, the aim is to improve the unsupervised anomaly detection in honeypots data by varying the data feature subset and the parameterization of the anomaly detection algorithm. To this purpose, an outlier ensemble with LOF (Local Outlier Factor) as a base algorithm is proposed. The ensemble outperforms existing solutions as depicted in the experiments where a detection rate higher than 92% is achieved.
引用
收藏
页码:743 / 758
页数:16
相关论文
共 27 条
  • [1] Aggarwal C. C., 2001, SIGMOD Record, V30, P37, DOI 10.1145/376284.375668
  • [2] Almotairi S., 2009, 2009 Fourth International Conference on Internet Monitoring and Protection (ICIMP 2009), P7, DOI 10.1109/ICIMP.2009.9
  • [3] Characterization of Attackers' Activities in Honeypot Traffic Using Principal Component Analysis
    Almotairi, S.
    Clark, A.
    Mohay, G.
    Zimmermann, J.
    [J]. 2008 IFIP INTERNATIONAL CONFERENCE ON NETWORK AND PARALLEL COMPUTING, PROCEEDINGS, 2008, : 147 - 154
  • [4] [Anonymous], 2018, SOFTWARE NETWORKING
  • [5] [Anonymous], P 10 ACM S INF COMP
  • [6] [Anonymous], 2004, P AUSCERT AS PAC INF
  • [7] [Anonymous], 2014, ACM SIGKDD EXPLOR NE, DOI [DOI 10.1145/2594473.2594476, 10.1145/2594473.2594476]
  • [8] LOF: Identifying density-based local outliers
    Breunig, MM
    Kriegel, HP
    Ng, RT
    Sander, J
    [J]. SIGMOD RECORD, 2000, 29 (02) : 93 - 104
  • [9] Charu C., 2012, ACM SIGKDD EXPLORATI, V14, P49, DOI DOI 10.1145/2481244.2481252
  • [10] Fan W., 2017, IEEE SYSTEMS J, P1