Data preprocessing for anomaly based network intrusion detection: A review

被引:164
|
作者
Davis, Jonathan J. [1 ]
Clark, Andrew J. [2 ]
机构
[1] DSTO, Div C3I, Edinburgh, SA 5111, Australia
[2] Queensland Univ Technol, Informat Secur Inst, Brisbane, Qld 4001, Australia
关键词
Data preprocessing; Network intrusion; Anomaly detection; Data mining; Feature construction; Feature selection; SYSTEM;
D O I
10.1016/j.cose.2011.05.008
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Data preprocessing is widely recognized as an important stage in anomaly detection. This paper reviews the data preprocessing techniques used by anomaly-based network intrusion detection systems (NIDS), concentrating on which aspects of the network traffic are analyzed, and what feature construction and selection methods have been used. Motivation for the paper comes from the large impact data preprocessing has on the accuracy and capability of anomaly-based NIDS. The review finds that many NIDS limit their view of network traffic to the TCP/IP packet headers. Time-based statistics can be derived from these headers to detect network scans, network worm behavior, and denial of service attacks. A number of other NIDS perform deeper inspection of request packets to detect attacks against network services and network applications. More recent approaches analyze full service responses to detect attacks targeting clients. The review covers a wide range of NIDS, highlighting which classes of attack are detectable by each of these approaches. Data preprocessing is found to predominantly rely on expert domain knowledge for identifying the most relevant parts of network traffic and for constructing the initial candidate set of traffic features. On the other hand, automated methods have been widely used for feature extraction to reduce data dimensionality, and feature selection to find the most relevant subset of features from this candidate set. The review shows a trend toward deeper packet inspection to construct more relevant features through targeted content parsing. These context sensitive features are required to detect current attacks. Crown Copyright (C) 2011 Published by Elsevier Ltd. All rights reserved.
引用
收藏
页码:353 / 375
页数:23
相关论文
共 50 条
  • [21] Anomaly-Based Network Intrusion Detection: An Outlier Detection Techniques
    Kumar, Neeraj
    Kumar, Upendra
    PROCEEDINGS OF THE EIGHTH INTERNATIONAL CONFERENCE ON SOFT COMPUTING AND PATTERN RECOGNITION (SOCPAR 2016), 2018, 614 : 262 - 269
  • [22] Ensemble classifiers for supervised anomaly based network intrusion detection
    Timcenko, Valentina
    Gajin, Slavko
    2017 13TH IEEE INTERNATIONAL CONFERENCE ON INTELLIGENT COMPUTER COMMUNICATION AND PROCESSING (ICCP), 2017, : 13 - 19
  • [23] Stochastic protocol modeling for anomaly based network intrusion detection
    Estevez-Tapiador, JM
    Garcia-Teodoro, P
    Diaz-Verdejo, JE
    IWIA 2003: FIRST IEEE INTERNATIONAL WORKSHOP ON INFORMATION ASSURANCE, PROCEEDINGS, 2003, : 3 - 12
  • [24] Performance Analysis of Anomaly Based Network Intrusion Detection Systems
    Abedin, Md. Zainal
    Siddiquee, Kazy Noor-e-Alam
    Bhuyan, M. S.
    Karim, Razuan
    Hossain, Mohammad Shahadat
    Andersson, Karl
    PROCEEDINGS OF THE 2018 43RD ANNUAL IEEE CONFERENCE ON LOCAL COMPUTER NETWORKS WORKSHOPS (LCN WORKSHOPS), 2018, : 1 - 7
  • [25] Network Anomaly Intrusion Detection Based on Deep Learning Approach
    Wang, Yung-Chung
    Houng, Yi-Chun
    Chen, Han-Xuan
    Tseng, Shu-Ming
    SENSORS, 2023, 23 (04)
  • [26] Fuzzy mega cluster based anomaly network intrusion detection
    Hubballi, Neminath
    Biswas, Santosh
    Nandi, Sukumar
    2009 INTERNATIONAL CONFERENCE ON NETWORK AND SERVICE SECURITY, 2009, : 82 - 86
  • [27] Anomaly-Based Network Intrusion Detection Using SVM
    Zhang, Yuan
    Yang, Qinghai
    Lambotharan, Sangarapillai
    Kyriakopoulos, Konstantinos
    Ghafir, Ibrahim
    AsSadhan, Basil
    2019 11TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS AND SIGNAL PROCESSING (WCSP), 2019,
  • [28] Research on methods of network connection based anomaly intrusion detection
    Wang, Y
    Zhang, HM
    Yang, HH
    Wang, XY
    SYSTEM SIMULATION AND SCIENTIFIC COMPUTING, VOLS 1 AND 2, PROCEEDINGS, 2005, : 1304 - 1309
  • [29] IBBO-LSSVM-based network anomaly intrusion detection
    Zhou, Peng
    Chou, Wen-Kuang
    INTERNATIONAL JOURNAL OF EMBEDDED SYSTEMS, 2019, 11 (03) : 352 - 362
  • [30] A new method of data preprocessing and anomaly detection
    Zheng, J
    Hu, MZ
    Zhang, HL
    PROCEEDINGS OF THE 2004 INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND CYBERNETICS, VOLS 1-7, 2004, : 2685 - 2690