A Deep Learning Enabled Subspace Spectral Ensemble Clustering Approach for Web Anomaly Detection

被引:0
作者
Yuan, Guiqin [1 ]
Li, Bo [1 ]
Yao, Yiyang [2 ]
Zhang, Simin [1 ]
机构
[1] Beihang Univ, Sch Engn & Comp Sci, Beijing, Peoples R China
[2] State Grid Zhejiang Elect Power Co Informat & Tel, Hangzhou, Zhejiang, Peoples R China
来源
2017 INTERNATIONAL JOINT CONFERENCE ON NEURAL NETWORKS (IJCNN) | 2017年
关键词
Anomaly detection; Deep learning; Multiclustering;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
With the development of the Internet, it is vital for the security of the Internet to detect web-based anomalies. Clustering based on feature extraction by manually has been verified as a significant way to detect new anomalies. But the presentations of these features can't express semantic information of the URLs. In addition, few studies try to cluster the anomalies into specific types like SQL-injection. In order to solve these two problems, we provide a deep learning enabled subspace spectral ensemble clustering approach for web anomaly detection called DEP-SSEC. This approach has three steps. Firstly, an ensemble clustering model is applied to separate anomalies from normal samples. Then we use word2vec to get the semantical presentations of anomalies. Finally, another multi-clustering approach clusters anomalies into specific types. Our approach is run on a real-life dataset. The result achieves about 0.8321 NMI and 0.8691 Rn, which demonstrates that our model has the ability to cluster anomalies into appropriate types.
引用
收藏
页码:3896 / 3903
页数:8
相关论文
共 28 条
  • [1] [Anonymous], 2015, P 21 ACM SIGKDD INT
  • [2] Random forests
    Breiman, L
    [J]. MACHINE LEARNING, 2001, 45 (01) : 5 - 32
  • [3] Unsupervised Network Intrusion Detection Systems: Detecting the Unknown without Knowledge
    Casas, Pedro
    Mazel, Johan
    Owezarski, Philippe
    [J]. COMPUTER COMMUNICATIONS, 2012, 35 (07) : 772 - 783
  • [4] Eskin Eleazar, 2002, APPL DATA MINING COM, V6, P77, DOI DOI 10.1007/978-1-4615-0953-0_4
  • [5] Support Vector Machines for TCP traffic classification
    Este, Alice
    Gringoli, Francesco
    Salgarelli, Luca
    [J]. COMPUTER NETWORKS, 2009, 53 (14) : 2476 - 2490
  • [6] Gutmann MU, 2012, J MACH LEARN RES, V13, P307
  • [7] Data clustering: 50 years beyond K-means
    Jain, Anil K.
    [J]. PATTERN RECOGNITION LETTERS, 2010, 31 (08) : 651 - 666
  • [8] Kim Y, 30 AAAI C ART INT
  • [9] A multi-model approach to the detection of web-based attacks
    Kruegel, C
    Vigna, G
    Robertson, W
    [J]. COMPUTER NETWORKS, 2005, 48 (05) : 717 - 738
  • [10] Le Q., 2014, DISTRIBUTED REPRESEN, DOI DOI 10.1145/2740908.2742760