An Initial Investigation on Sliding Windows for Anomaly-Based Intrusion Detection

被引:4
作者
Zoppi, Tommaso [1 ]
Ceccarelli, Andrea [1 ]
Bondavalli, Andrea [1 ]
机构
[1] Univ Florence, Dept Math & Informat, Florence, Italy
来源
2019 IEEE WORLD CONGRESS ON SERVICES (IEEE SERVICES 2019) | 2019年
关键词
anomaly detection; intrusion detection; security; sliding window; algorithms; data mining; SYSTEMS;
D O I
10.1109/SERVICES.2019.00031
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The growing systems complexity calls for dedicated monitoring and data analysis strategies aiming to detect faults, attacks and errors before they escalate into failures. Distributed and heterogeneous systems are more likely to expose vulnerabilities that attackers may target to get unauthorized access to a system, make it unavailable or steal sensitive data. As countermeasure, traditionally techniques for attacks and intrusion detection are based on signature recognition and requires knowledge on the attacks pattern: therefore, they are not well-suited to detect zero-days attacks. A viable alternative is anomaly detection, where deviation from the expected behavior are suspected as attacks. However, anomaly detection is generally not applicable in systems where the expected behavior changes through time. In this paper we explore anomaly detection strategies based on sliding windows, which are intended for evolving and dynamic systems as IoT, in which system configuration and behavior may change continuously. We first describe the context and the key features of sliding windows, and then we proceed detailing their possible drawbacks. Discussion is substantiated by quantitative analyses directed to evaluate detection capabilities. The experimental campaign is based on state-of-the-art algorithms and datasets, and results have been made publicly available.
引用
收藏
页码:99 / 104
页数:6
相关论文
共 35 条
  • [1] [Anonymous], KDD CUP 99 KNOWLEDGE
  • [2] [Anonymous], 2013, NIST SPECIAL PUBLICA, pB
  • [3] Bar-Yam Y., 2002, Encyclopedia of Life Support Systems, VVolume 1
  • [4] Bilge Leyla, 2012, P 2012 ACM C COMP CO, P833, DOI DOI 10.1145/2382196.2382284
  • [5] Optimal classifier for imbalanced data using Matthews Correlation Coefficient metric
    Boughorbel, Sabri
    Jarray, Fethi
    El-Anbari, Mohammed
    [J]. PLOS ONE, 2017, 12 (06):
  • [6] Bovenzi Antonio, 2011, Computer Safety, Reliability, and Security. Proceedings 30th International Conference, SAFECOMP 2011, P128, DOI 10.1007/978-3-642-24270-0_10
  • [7] Campos G. O., 2016, LERNEN WISSEN DATEN
  • [8] Recent Advances in the DependabIlity AssessmeNt of Complex systEms (RADIANCE)
    Carvalho, Ariadne M. B. R.
    Antunes, Nuno
    Ceccarelli, Andrea
    Zentai, Andras
    [J]. 2016 46TH ANNUAL IEEE/IFIP INTERNATIONAL CONFERENCE ON DEPENDABLE SYSTEMS AND NETWORKS WORKSHOPS (DSN-W), 2016, : 1 - 1
  • [9] A Multi-layer Anomaly Detector for Dynamic Service-Based Systems
    Ceccarelli, Andrea
    Zoppi, Tommaso
    Itria, Massimiliano
    Bondavalli, Andrea
    [J]. COMPUTER SAFETY, RELIABILITY, AND SECURITY, SAFECOMP 2015, 2015, 9337 : 166 - 180
  • [10] Ten quick tips for machine learning in computational biology
    Chicco, Davide
    [J]. BIODATA MINING, 2017, 10