A hierarchical hybrid framework for modelling anomalous behaviours

被引:3
作者
Angiulli, Fabrizio [1 ]
Argento, Luciano [1 ]
Furfaro, Angelo [1 ,2 ]
Parise, Andrea [2 ]
机构
[1] Univ Calabria, Dipartimento Ingn Informat Modellist Elettron & S, P Bucci 41C, I-87036 Arcavacata Di Rende, CS, Italy
[2] Open Knowledge Technol Srl, Piazza Vermicelli, I-87036 Arcavacata Di Rende, CS, Italy
关键词
Software framework; Anomalous behaviour modelling; Anomaly detection; Signature detection; Data analysis; CONCEPT DRIFT; STEGANALYSIS; SYSTEMS;
D O I
10.1016/j.simpat.2017.12.013
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
The presence of anomalies in collected information, i.e. data that deviates substantially from what is normally expected, is a valuable source of knowledge and its discovery has many practical applications. Anomaly-detection approaches rely on building models that suitably describe data patterns deemed as normal, however they may incur the generation of a considerable amount of false positives. Signature-based techniques, which exploit a prior knowledge base of anomalous patterns, are able to effectively detect them but fail in identifying anomalies which did not occur previously. Hybrid anomaly detection systems combine the two approaches in order to obtain better detection performances. This paper proposes a framework, called HALF, that allows to develop hybrid systems by combining available techniques, coming from both approaches. HALF is able to operate on any data type and provides native support to online learning, or concept drifting. This enables the incremental updating of the knowledge bases used by the techniques. HALF has been designed to accommodate multiple mining algorithms by organizing them in a hierarchical structure in order to offer an higher and flexible detection capability. The framework effectiveness is demonstrated through two case studies concerning a network intrusion detection system and a steganography hunting system. (c) 2017 Elsevier B.V. Allrights reserved.
引用
收藏
页码:103 / 115
页数:13
相关论文
共 50 条
[1]   Generalized radial basis function networks for classification and novelty detection: self-organization of optimal Bayesian decision [J].
Albrecht, S ;
Busch, J ;
Kloppenburg, M ;
Metze, F ;
Tavan, P .
NEURAL NETWORKS, 2000, 13 (10) :1075-1093
[2]  
Alippi C, 2009, IEEE IJCNN, P1537
[3]   Exploiting n-gram location for intrusion detection [J].
Angiulli, Fabrizio ;
Argento, Luciano ;
Furfaro, Angelo .
2015 IEEE 27TH INTERNATIONAL CONFERENCE ON TOOLS WITH ARTIFICIAL INTELLIGENCE (ICTAI 2015), 2015, :1093-1098
[4]  
[Anonymous], 2008, 2008 11 INT C INFORM
[5]  
[Anonymous], 2016, Data mining and machine learning in cybersecurity
[6]  
[Anonymous], Proceedings of the 9th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, 2003
[7]  
Ansari S, 2002, IEEE POTENTIALS, V21, P17, DOI 10.1109/MP.2002.1166620
[8]   A hybrid intrusion detection system design for computer network security [J].
Aydin, M. Ali ;
Zaim, A. Halim ;
Ceylan, K. Goekhan .
COMPUTERS & ELECTRICAL ENGINEERING, 2009, 35 (03) :517-526
[9]  
Barbara Daniel., 2001, P IEEE WORKSHOP INFO, P11
[10]   Network Anomaly Detection: Methods, Systems and Tools [J].
Bhuyan, Monowar H. ;
Bhattacharyya, D. K. ;
Kalita, J. K. .
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2014, 16 (01) :303-336