Anomaly Detection for PTM's Network Traffic Using Association Rule

被引:0
作者
Eljadi, Entisar E. [1 ]
Othman, Zulaiha Ali [1 ]
机构
[1] Univ Kebangsaan Malaysia, Fac Informat Sci & Technol, Sch Comp Sci, Bangi 43600, Selangor, Malaysia
来源
2011 3RD CONFERENCE ON DATA MINING AND OPTIMIZATION (DMO) | 2011年
关键词
network intrusion detection system (NIDS); Data Mining; Association Rules Techniques;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
In order to evaluate the quality of UKM's NIDS, this paper presents the process of analyzing network traffic captured by Pusat Teknologi Maklumat (PTM) to detect whether it has any anomalies or not and to produce corresponding anomaly rules to be included in an update of UKM's NIDS. The network traffic data was collected using WireShark for three days, using the six most common network attributes. The experiment used three association rule data mining techniques known as Appriori, Fuzzy Appriori and FP-Growth based on two, five and ten second window slicing. Out of the four data-sets, data-sets one and two were detected to have anomalies. The results show that the Fuzzy Appriori algorithm presented the best quality result, while FP-Growth presented a faster time to reach a solution. The data-sets, which was pre-processed in the form of two second window slicing displayed better results. This research outlines the steps that can be utilized by an organization to capture and detect anomalies using association rule data mining techniques to enhance the quality their of NIDS.
引用
收藏
页码:63 / 69
页数:7
相关论文
共 50 条
  • [31] A review of social network centric anomaly detection techniques
    Kaur, Ravneet
    Singh, Sarbjeet
    INTERNATIONAL JOURNAL OF COMMUNICATION NETWORKS AND DISTRIBUTED SYSTEMS, 2016, 17 (04) : 358 - 386
  • [32] Unusual Internet Traffic Detection at Network Edge
    Bansal, Neha
    Kaushal, Rishabh
    2015 INTERNATIONAL CONFERENCE ON COMPUTING AND NETWORK COMMUNICATIONS (COCONET), 2015, : 179 - 185
  • [33] ENSEMBLE TECHNIQUE FOR INTRUDER DETECTION IN NETWORK TRAFFIC
    Agrawal, Amar
    Mohammed, Sabah
    Fiaidhi, Jinan
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2019, 13 (03): : 1 - 8
  • [34] The Intrusion Detection System Based on a Novel Association Rule
    Gu, Baoping
    Guo, Honyan
    2014 INTERNATIONAL CONFERENCE ON INFORMATION SCIENCE, ELECTRONICS AND ELECTRICAL ENGINEERING (ISEEE), VOLS 1-3, 2014, : 1312 - 1315
  • [35] Forecasting urban traffic congestion conduction based on spatiotemporal association rule mining
    Zhou H.
    Li R.
    Huang A.
    Wang Q.
    He Z.
    Wang S.
    Xitong Gongcheng Lilun yu Shijian/System Engineering Theory and Practice, 2022, 42 (08): : 2210 - 2224
  • [36] Detection of Sensitive Items in Market Basket Database using Association Rule Mining for Privacy Preserving
    Kasthuri, S.
    Meyyappan, T.
    2013 INTERNATIONAL CONFERENCE ON PATTERN RECOGNITION, INFORMATICS AND MEDICAL ENGINEERING (PRIME), 2013,
  • [37] Graph neural network approach with spatial structure to anomaly detection of network data
    Hao Zhang
    Yun Zhou
    Huahu Xu
    Jiangang Shi
    Xinhua Lin
    Yiqin Gao
    Journal of Big Data, 12 (1)
  • [38] Multi-Layer Anomaly Detection for Internet Traffic Based on Data Mining
    Cui, Baojiang
    He, Shanshan
    Jin, Haifeng
    2015 9TH INTERNATIONAL CONFERENCE ON INNOVATIVE MOBILE AND INTERNET SERVICES IN UBIQUITOUS COMPUTING IMIS 2015, 2015, : 277 - 282
  • [39] Image segmentation using association rule features
    Rushing, JA
    Ranganath, H
    Hinke, TH
    Graves, SJ
    IEEE TRANSACTIONS ON IMAGE PROCESSING, 2002, 11 (05) : 558 - 567
  • [40] IMPROVED ASSOCIATION RULE MINING ALGORITHM FOR NETWORK ALARM ANALYSIS
    Zhao, Xinghua
    Li, Jie
    Wang, Yunfeng
    2009 GLOBAL MOBILE CONGRESS, 2009, : 323 - 328