Automated Anomaly Detector Adaptation using Adaptive Threshold Tuning

被引:11
作者
Ali, Muhammad Qasim [1 ]
Al-Shaer, Ehab [1 ]
Khan, Hassan [2 ]
Khayam, Syed Ali
机构
[1] Univ N Carolina, Dept Software & Informat Syst, Charlotte, NC 28223 USA
[2] Natl Univ Sci & Technol, Karachi, Pakistan
基金
美国国家科学基金会;
关键词
Algorithms; Security; Adaptive thresholding; anomaly detection; intrusion detection; anomaly scores;
D O I
10.1145/2445566.2445569
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Real-time network-and host-based Anomaly Detection Systems (ADSs) transform a continuous stream of input data into meaningful and quantifiable anomaly scores. These scores are subsequently compared to a fixed detection threshold and classified as either benign or malicious. We argue that a real-time ADS' input changes considerably over time and a fixed threshold value cannot guarantee good anomaly detection accuracy for such a time-varying input. In this article, we propose a simple and generic technique to adaptively tune the detection threshold of any ADS that works on threshold method. To this end, we first perform statistical and information-theoretic analysis of network-and host-based ADSs' anomaly scores to reveal a consistent time correlation structure during benign activity periods. We model the observed correlation structure using Markov chains, which are in turn used in a stochastic target tracking framework to adapt an ADS' detection threshold in accordance with real-time measurements. We also use statistical techniques to make the proposed algorithm resilient to sporadic changes and evasion attacks. In order to evaluate the proposed approach, we incorporate the proposed adaptive thresholding module into multiple ADSs and evaluate those ADSs over comprehensive and independently collected network and host attack datasets. We show that, while reducing the need of human threshold configuration, the proposed technique provides considerable and consistent accuracy improvements for all evaluated ADSs.
引用
收藏
页数:30
相关论文
共 50 条
[1]   A framework for on-demand classification of evolving data streams [J].
Aggarwal, CC ;
Han, JW ;
Wang, JY ;
Yu, PS .
IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, 2006, 18 (05) :577-589
[2]  
Agosta J.M., 2007, P 2 USENIX WORKSH TA, P3
[3]  
Ali MQ, 2009, CCS'09: PROCEEDINGS OF THE 16TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, P314
[4]   On Mitigating Sampling-Induced Accuracy Loss in Traffic Anomaly Detection Systems [J].
Ali, Sardar ;
Ul Haq, Irfan ;
Rizvi, Sajjad ;
Rasheed, Naurin ;
Sarfraz, Unum ;
Khayam, Ali ;
Mirza, Fauzan .
ACM SIGCOMM COMPUTER COMMUNICATION REVIEW, 2010, 40 (03) :4-16
[5]  
[Anonymous], TCPDUMP TOOL
[6]  
[Anonymous], NETSP TOOL
[7]  
[Anonymous], TADM TOOLK ADV DISCR
[8]  
[Anonymous], CISC AN GUARD MOD HO
[9]  
[Anonymous], SSH2FTPCRACK FTP SSH
[10]  
[Anonymous], LBNL DAT