Anomaly Detection for PTM's Network Traffic Using Association Rule

被引:0
|
作者
Eljadi, Entisar E. [1 ]
Othman, Zulaiha Ali [1 ]
机构
[1] Univ Kebangsaan Malaysia, Fac Informat Sci & Technol, Sch Comp Sci, Bangi 43600, Selangor, Malaysia
来源
2011 3RD CONFERENCE ON DATA MINING AND OPTIMIZATION (DMO) | 2011年
关键词
network intrusion detection system (NIDS); Data Mining; Association Rules Techniques;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
In order to evaluate the quality of UKM's NIDS, this paper presents the process of analyzing network traffic captured by Pusat Teknologi Maklumat (PTM) to detect whether it has any anomalies or not and to produce corresponding anomaly rules to be included in an update of UKM's NIDS. The network traffic data was collected using WireShark for three days, using the six most common network attributes. The experiment used three association rule data mining techniques known as Appriori, Fuzzy Appriori and FP-Growth based on two, five and ten second window slicing. Out of the four data-sets, data-sets one and two were detected to have anomalies. The results show that the Fuzzy Appriori algorithm presented the best quality result, while FP-Growth presented a faster time to reach a solution. The data-sets, which was pre-processed in the form of two second window slicing displayed better results. This research outlines the steps that can be utilized by an organization to capture and detect anomalies using association rule data mining techniques to enhance the quality their of NIDS.
引用
收藏
页码:63 / 69
页数:7
相关论文
共 50 条
  • [1] USING R FOR ANOMALY DETECTION IN NETWORK TRAFFIC
    Hock, Denis
    Kappes, Martin
    PROCEEDINGS OF THE FIFTH INTERNATIONAL CONFERENCE ON INTERNET TECHNOLOGIES AND APPLICATIONS (ITA 13), 2013, : 98 - 105
  • [2] Anomaly detection in network traffic
    Duraj, Agnieszka
    Bucki, Pawel
    Drajling, Aleksander
    Makrocki, Robert
    Sipinski, Mateusz
    PRZEGLAD ELEKTROTECHNICZNY, 2022, 98 (12): : 205 - 208
  • [3] Network traffic anomaly detection using PCA and BiGAN
    Patil, Rajlaxmi
    Biradar, Rajshekhar
    Ravi, Vinayakumar
    Biradar, Poornima
    Ghosh, Uttam
    INTERNET TECHNOLOGY LETTERS, 2022, 5 (01)
  • [4] Unsupervised anomaly detection for network traffic using artificial immune network
    Yuanquan Shi
    Hong Shen
    Neural Computing and Applications, 2022, 34 : 13007 - 13027
  • [5] Unsupervised anomaly detection for network traffic using artificial immune network
    Shi, Yuanquan
    Shen, Hong
    NEURAL COMPUTING & APPLICATIONS, 2022, 34 (15): : 13007 - 13027
  • [6] Network traffic anomaly detection algorithm using mahout classifier
    Peng, Hua
    Liu, Liang
    Liu, Jiayong
    Lewis, Johnwb R.
    JOURNAL OF INTELLIGENT & FUZZY SYSTEMS, 2019, 37 (01) : 137 - 144
  • [7] Anomaly detection in network traffic using extreme learning machine
    Imamverdiyev, Yadigar
    Sukhostat, Lyudmila
    2016 IEEE 10TH INTERNATIONAL CONFERENCE ON APPLICATION OF INFORMATION AND COMMUNICATION TECHNOLOGIES (AICT), 2016, : 418 - 421
  • [8] Network Traffic Anomaly Detection using Machine Learning Approaches
    Limthong, Kriangkrai
    Tawsook, Thidarat
    2012 IEEE NETWORK OPERATIONS AND MANAGEMENT SYMPOSIUM (NOMS), 2012, : 542 - 545
  • [9] Anomaly detection in symmetric network traffic
    Yu, Ming
    Zhou, Xi-Yuan
    WSEAS Transactions on Information Science and Applications, 2007, 4 (09): : 1360 - 1364
  • [10] Anomaly detection for network traffic flow
    Shan, Rongsheng
    Li, Jianhua
    Wang, Mingzheng
    Journal of Southeast University (English Edition), 2004, 20 (01) : 16 - 20