Reservoir-based network traffic stream summarization for anomaly detection

被引:7
作者
Ahmed, Mohiuddin [1 ]
机构
[1] Canberra Inst Technol, Canberra, ACT, Australia
关键词
Reservoir; Stream summary; Clustering; Anomaly detection; ALGORITHMS;
D O I
10.1007/s10044-017-0659-y
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Summarization is an important intermediate step for expediting knowledge discovery tasks such as anomaly detection. In the context of anomaly detection from data stream, the summary needs to represent both anomalous and normal data. But streaming data has distinct characteristics, such as one-pass constraint, for which conducting data mining operations are difficult. Existing stream summarization techniques are unable to create summary which represent both normal and anomalous instances. To address this problem, in this paper, a number of hybrid summarization techniques are designed and developed using the concept of reservoir for anomaly detection from network traffic. Experimental results on thirteen benchmark data streams show that the summaries produced from stream using pairwise distance (PSSR) and template matching (TMSSR) techniques can retain more anomalies than existing stream summarization techniques, and anomaly detection technique can identify the anomalies with high true positive and low false positive rate.
引用
收藏
页码:579 / 599
页数:21
相关论文
共 58 条
[1]  
Abdi H., 2007, Encyclopedia of Measurement and Statistics, P280, DOI DOI 10.4135/9781412952644.N142
[2]  
Aggarwal C.C., 2007, Data streams: models and algorithms, P169, DOI DOI 10.1007/978-0-387-47534-9_9
[3]  
Aggarwal C.C., 2006, P 32 INT C VER LARG, P607
[4]  
Ahmed M., 2014, SCALABLE INFORM SYST, P51
[5]   A survey of network anomaly detection techniques [J].
Ahmed, Mohiuddin ;
Mahmood, Abdun Naser ;
Hu, Jiankun .
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2016, 60 :19-31
[6]   A survey of anomaly detection techniques in financial domain [J].
Ahmed, Mohiuddin ;
Mahmood, Abdun Naser ;
Islam, Md. Rafiqul .
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2016, 55 :278-288
[7]  
Ahmed M, 2014, C IND ELECT APPL, P1780, DOI 10.1109/ICIEA.2014.6931456
[8]  
Almalawi A, 2013, C LOCAL COMPUT NETW, P639, DOI 10.1109/LCN.2013.6761301
[9]   An unsupervised anomaly-based detection approach for integrity attacks on SCADA systems [J].
Almalawi, Abdulmohsen ;
Yu, Xinghuo ;
Tari, Zahir ;
Fahad, Adil ;
Khalil, Ibrahim .
COMPUTERS & SECURITY, 2014, 46 :94-110
[10]  
[Anonymous], ARXIV160405449