Network Anomaly Detection in Time Series using Distance Based Outlier Detection with Cluster Density Analysis

被引:0
作者
Flanagan, Kieran [1 ,2 ]
Fallon, Enda [1 ]
Connolly, Paul [2 ]
Awad, Abir [3 ]
机构
[1] Athlone Inst Technol, Software Res Inst, Athlone, Ireland
[2] NPD Grp Inc, IDA Business Pk, Athlone, Co Westmeath, Ireland
[3] Univ South Wales, Fac Comp Engn & Sci, Pontypridd, M Glam, Wales
来源
PROCEEDINGS OF THE 2017 7TH INTERNATIONAL CONFERENCE INTERNET TECHNOLOGIES AND APPLICATIONS (ITA) | 2017年
关键词
Micro Clustering Outlier Detection (MCOD); NetFlow; Anomaly Detection;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
It is common place in any organizational environment that data stored internally does not necessarily belong to the company storing the data. In such cases, keeping this data secured is of critical importance. If such data is compromised, it can lead to devastating effects on both the public image of the organization and the relations between said company and its business partners. To combat this surge in malicious activity in recent years, research has focused on using anomaly detection techniques to detect possible malicious activity on a network. This paper proposes an evolution of the MCOD (Micro-Clustering Outlier Detection) machine learning algorithm. Designed to implement a time-series approach along with using both distance based outlier detection and cluster density analysis, we analysis the results of this algorithm on real-world data.
引用
收藏
页码:116 / 121
页数:6
相关论文
共 13 条
  • [1] [Anonymous], P INT C EL ENG INF I
  • [2] Analysis of the impact of sampling on Net Flow traffic classification
    Carela-Espanol, Valentin
    Barlet-Ros, Pere
    Cabellos-Aparicio, Albert
    Sole-Pareta, Josep
    [J]. COMPUTER NETWORKS, 2011, 55 (05) : 1083 - 1099
  • [3] Gang Xiong, 2010, Proceedings 2010 Second International Conference on Multimedia Information Networking and Security (MINES 2010), P579, DOI 10.1109/MINES.2010.127
  • [4] Goldstein M, 2012, INT C PATT RECOG, P2282
  • [5] A novel network Intrusion Detection System(NIDS) based on signatures search of data mining
    Hu Zhengbing
    Li Zhitang
    Wu Junqi
    [J]. FIRST INTERNATIONAL WORKSHOP ON KNOWLEDGE DISCOVERY AND DATA MINING, PROCEEDINGS, 2007, : 10 - +
  • [6] Kontaki M, 2011, PROC INT CONF DATA, P135, DOI 10.1109/ICDE.2011.5767923
  • [7] Traffic Verification for Network Anomaly Detection in Sensor Networks
    Lalitha, K., V
    Josna, V. R.
    [J]. INTERNATIONAL CONFERENCE ON EMERGING TRENDS IN ENGINEERING, SCIENCE AND TECHNOLOGY (ICETEST - 2015), 2016, 24 : 1400 - 1405
  • [8] A survey of network flow applications
    Li, Bingdong
    Springer, Jeff
    Bebis, George
    Gunes, Mehmet Hadi
    [J]. JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2013, 36 (02) : 567 - 581
  • [9] M?nz G., 2007, GI/ITG Workshop MMBnet, V7, P9
  • [10] Parallel outlier detection on uncertain data for GPUs
    Matsumoto, Takazumi
    Hung, Edward
    Yiu, Man Lung
    [J]. DISTRIBUTED AND PARALLEL DATABASES, 2015, 33 (03) : 417 - 447