Efficacy Improvement of Anomaly Detection by Using Intelligence Sharing Scheme

被引:5
作者
Tahir, Muhammad [1 ]
Li, Mingchu [1 ]
Ayoub, Naeem [2 ]
Aamir, Muhammad [3 ]
机构
[1] Dalian Univ Technol, Sch Software Technol, Dalian 116621, Peoples R China
[2] Dalian Univ Technol, Sch Comp Sci & Technol, Dalian 116024, Peoples R China
[3] Sichuan Univ, Coll Comp Sci, Chengdu 610065, Sichuan, Peoples R China
来源
APPLIED SCIENCES-BASEL | 2019年 / 9卷 / 03期
关键词
intrusion detection systems; global reputation model; anomaly detection; intelligence sharing scheme; CTA-IDS; machine learning; NETWORKS; SYSTEMS; SCORES;
D O I
10.3390/app9030364
中图分类号
O6 [化学];
学科分类号
0703 ;
摘要
Computer networks are facing threats of ever-increasing frequency and sophistication. Encryption is becoming the norm in both legitimate and malicious network traffic. Therefore, intrusion detection systems (IDSs) are now required to work efficiently regardless of the encryption. In this study, we propose two new methods to improve the efficacy of the Cisco Cognitive Threat Analytics (CTA) system. In the first method, the efficacy of CTA is improved by sharing of intelligence information across a large number of enterprise networks. In the second method, a four variant-based global reputation model (GRM) is designed by employing an outlier ensemble normalization algorithm in the presence of missing data. Intelligence sharing provides additional information in the intrusion detection process, which is much needed, particularly for analysis of encrypted traffic with inherently low information content. Robustness of the novel outlier ensemble normalization algorithm is also demonstrated. These improvements are measured using both encrypted and non-encrypted network traffic. Results show that the proposed information sharing methods greatly improve the anomaly detection efficacy of malicious network behavior with bad base-line detection efficacy and slightly improve upon the average case.
引用
收藏
页数:27
相关论文
共 44 条
[1]  
Adah AganaM., 2018, International Journal of Engineering Technology, V7, P39, DOI DOI 10.14419/IJET.V7I3.19.16985
[2]  
Aggarwal C., 2017, Outlier Ensembles - An Introduction
[3]  
Aggarwal C.C., 2013, ACM SIGKDD Explor. Newslett., V14, P49, DOI [DOI 10.1145/2481244.2481252, 10.1145/2481244.2481252]
[4]   KDD 1999 generation faults: a review and analysis [J].
Al Tobi, Amjad M. ;
Duncan, Ishbel .
Journal of Cyber Security Technology, 2018, 2 (3-4) :164-200
[5]   A P2P Botnet detection scheme based on decision tree and adaptive multilayer neural networks [J].
Alauthaman, Mohammad ;
Aslam, Nauman ;
Zhang, Li ;
Alasem, Rafe ;
Hossain, M. A. .
NEURAL COMPUTING & APPLICATIONS, 2018, 29 (11) :991-1004
[6]   Anomaly-based intrusion detection system through feature selection analysis and building hybrid efficient model [J].
Aljawarneh, Shadi ;
Aldwairi, Monther ;
Yassein, Muneer Bani .
JOURNAL OF COMPUTATIONAL SCIENCE, 2018, 25 :152-160
[7]  
Altman A, 2005, P 6 ACM C EL COMM, P1
[8]  
[Anonymous], 2018, A taxonomy and survey of intrusion detection system design techniques, network threats and datasets
[9]  
[Anonymous], COGN THREAT AN
[10]  
Antonakakis M., 2012, P USENIX SEC S BELL, V12