Network anomaly detection with the restricted Boltzmann machine

被引:247
作者
Fiore, Ugo [1 ]
Palmieri, Francesco [2 ]
Castiglione, Aniello [3 ]
De Santis, Alfredo [3 ]
机构
[1] Univ Naples Federico II, Ctr Ateneo Serv Informativi, Naples, Italy
[2] Seconda Univ Napoli, Dipartimento Ingn Informaz, Aversa, Italy
[3] Univ Salerno, Dipartimento Informat, Fisciano, Italy
关键词
Anomaly detection; Restricted Boltzmann machine; Semi-supervised learning; Intrusion detection; Energy-based models; INTRUSION; SYSTEMS;
D O I
10.1016/j.neucom.2012.11.050
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
With the rapid growth and the increasing complexity of network infrastructures and the evolution of attacks, identifying and preventing network abuses is getting more and more strategic to ensure an adequate degree of protection from both external and internal menaces. In this scenario many techniques are emerging for inspecting network traffic and discriminating between anomalous and normal behaviors to detect undesired or suspicious activities. Unfortunately, the concept of normal or abnormal network behavior depends on several factors and its recognition requires the availability of a model aiming at characterizing current behavior, based on a statistical idealization of past events. There are two main challenges when generating the training data needed for effective modeling. First, network traffic is very complex and unpredictable, and second, the model is subject to changes over time, since anomalies are continuously evolving. As attack techniques and patterns change, previously gained information about how to tell them apart from normal traffic may be no longer valid. Thus, a desirable characteristic of an effective model for network anomaly detection is its ability to adapt to change and to generalize its behavior to multiple different network environments. In other words, a self-learning system is needed. This suggests the adoption of machine learning techniques to implement semi-supervised anomaly detection systems where the classifier is trained with "normal" traffic data only, so that knowledge about anomalous behaviors can be constructed and evolve in a dynamic way. For this purpose we explored the effectiveness of a detection approach based on machine learning, using the Discriminative Restricted Boltzmann Machine to combine the expressive power of generative models with good classification accuracy capabilities to infer part of its knowledge from incomplete training data. (C) 2013 Elsevier B.V. All rights reserved.
引用
收藏
页码:13 / 23
页数:11
相关论文
共 29 条
[1]  
Ahmed Tarem., 2007, P 2 USENIX WORKSH TA, P1
[2]  
[Anonymous], 1980, Computer Security Threat Monitoring and Surveillance
[3]   Learning Deep Architectures for AI [J].
Bengio, Yoshua .
FOUNDATIONS AND TRENDS IN MACHINE LEARNING, 2009, 2 (01) :1-127
[4]  
Bishop C., 2006, PATTERN RECOGN, DOI DOI 10.1117/1.2819119
[5]  
Brugger S.T., 2007, TECHNICAL REPORT
[6]  
Castiglione A., 2012, 2012 Sixth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing (IMIS 2012), P603, DOI 10.1109/IMIS.2012.125
[7]  
Castiglione A., J NETWORK C IN PRESS, DOI DOI 10.1016/JJNCA.2013.05.002
[8]  
Chen CL, 2008, IEEE SYS MAN CYBERN, P2602
[9]  
Davenport M., 2006, P 2006 16 IEEE SIGN, P301
[10]  
Ficco M., 2011, 2011 First International Conference on Data Compression, Communications and Processing, P275, DOI 10.1109/CCP.2011.43