Neural visualization of network traffic data for intrusion detection

被引:118
作者
Corchado, Emilio [1 ]
Herrero, Alvaro [2 ]
机构
[1] Univ Salamanca, Dept Informat & Automat, E-37008 Salamanca, Spain
[2] Univ Burgos, Dept Civil Engn, Burgos 09006, Spain
关键词
Neural and exploratory projection techniques; Connectionist unsupervised models; Computer network security; Intrusion detection; Network traffic visualization; COMPONENT ANALYSIS; MAXIMUM;
D O I
10.1016/j.asoc.2010.07.002
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
This study introduces and describes a novel intrusion detection system (IDS) called MOVCIDS (mobile visualization connectionist IDS). This system applies neural projection architectures to detect anomalous situations taking place in a computer network. By its advanced visualization facilities, the proposed IDS allows providing an overview of the network traffic as well as identifying anomalous situations tackled by computer networks, responding to the challenges presented by volume, dynamics and diversity of the traffic, including novel (0-day) attacks. MOVCIDS provides a novel point of view in the field of IDSs by enabling the most interesting projections (based on the fourth order statistics; the kurtosis index) of a massive traffic dataset to be extracted. These projections are then depicted through a functional and mobile visualization interface, providing visual information of the internal structure of the traffic data. The interface makes MOVCIDS accessible from any mobile device to give more accessibility to network administrators, enabling continuous visualization, monitoring and supervision of computer networks. Additionally, a novel testing technique has been developed to evaluate MOVCIDS and other IDSs employing numerical datasets. To show the performance and validate the proposed IDS, it has been tested in different real domains containing several attacks and anomalous situations. In addition, the importance of the temporal dimension on intrusion detection, and the ability of this IDS to process it, are emphasized in this work. (C) 2010 Elsevier B. V. All rights reserved.
引用
收藏
页码:2042 / 2056
页数:15
相关论文
共 76 条
[1]  
Abdullah K, 2005, IEEE WORKSHOP ON VISUALIZATION FOR COMPUTER SECURITY 2005, PROCEEDINGS, P1
[2]   Visualizing network data for intrusion detection [J].
Abdullah, K ;
Lee, A ;
Conti, G ;
Copeland, JA .
PROCEEDINGS FROM THE SIXTH ANNUAL IEEE SYSTEMS, MAN AND CYBERNETICS INFORMATION ASSURANCE WORKSHOP, 2005, :100-108
[3]  
Abraham A., 2007, Int. J. Netw. Secur, V4, P328
[4]   D-SCIDS: Distributed soft computing intrusion detection system [J].
Abraham, Ajith ;
Jain, Ravi ;
Thomas, Johnson ;
Han, Sang Yong .
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2007, 30 (01) :81-98
[5]  
[Anonymous], 1992, Neural computation and self-organizing maps
[6]  
[Anonymous], 2006, ANN TELECOMMUN
[7]  
[Anonymous], READINGS INFORMATION
[8]   VISUALIZING NETWORK DATA [J].
BECKER, RA ;
EICK, SG ;
WILKS, AR .
IEEE TRANSACTIONS ON VISUALIZATION AND COMPUTER GRAPHICS, 1995, 1 (01) :16-28
[9]  
CASE J, 1990, INTERNET REQUEST MAY, P1157
[10]   Feature deduction and ensemble design of intrusion detection systems [J].
Chebrolu, S ;
Abraham, A ;
Thomas, JP .
COMPUTERS & SECURITY, 2005, 24 (04) :295-307