Network Anomaly Detection Using Header Information With Greedy Algorithm

被引:1
作者
Ates, Cagatay [1 ]
Ozdel, Suleyman [1 ]
Yildirim, Metehan [1 ]
Anarim, Emin [1 ]
机构
[1] Bogazici Univ, Elekt Elekt Muhendisligi Bolumu, Istanbul, Turkey
来源
2019 27TH SIGNAL PROCESSING AND COMMUNICATIONS APPLICATIONS CONFERENCE (SIU) | 2019年
关键词
Entropy; greedy; divergence; anomaly detection; intrusion detection; DDoS; SVM;
D O I
10.1109/siu.2019.8806451
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Network anomaly detection is an important and rapidly growing area. In this paper, we propose a new network anomaly detection method based on the probability distributions of header information. The distances between the distributions of headers are calculated to reflect the main characteristics of the network. These are calculated using Greedy algorithm which eliminates some requirements associated with Kullback-Leibler divergence such as having the same rank of the probability distributions. Then, Support Vector Machine classifier is used in the detection phase to reduce false alarm rates and to make the system adaptive for different networks. This algorithm is tested on the real data collected from Bogazici University network and MIT Darpa 2000 dataset.
引用
收藏
页数:4
相关论文
共 50 条
  • [21] Anomaly Detection Using Deep Neural Network for IoT Architecture
    Ahmad, Zeeshan
    Khan, Adnan Shahid
    Nisar, Kashif
    Haider, Iram
    Hassan, Rosilah
    Haque, Muhammad Reazul
    Tarmizi, Seleviawati
    Rodrigues, Joel J. P. C.
    APPLIED SCIENCES-BASEL, 2021, 11 (15):
  • [22] Robust anomaly detection in urban environments using sensor and information fusion and a camera network
    Andersson, Maria
    Hemstrom, Fredrik
    Molin, Sara
    COUNTERTERRORISM, CRIME FIGHTING, FORENSICS, AND SURVEILLANCE TECHNOLOGIES II, 2018, 10802
  • [23] Network Traffic Anomaly Detection using Machine Learning Approaches
    Limthong, Kriangkrai
    Tawsook, Thidarat
    2012 IEEE NETWORK OPERATIONS AND MANAGEMENT SYMPOSIUM (NOMS), 2012, : 542 - 545
  • [24] Counterfeit Anomaly Using Generative Adversarial Network for Anomaly Detection
    Shen, Haocheng
    Chen, Jingkun
    Wang, Ruixuan
    Zhang, Jianguo
    IEEE ACCESS, 2020, 8 (08): : 133051 - 133062
  • [25] Anomaly-Based Network Intrusion Detection Using SVM
    Zhang, Yuan
    Yang, Qinghai
    Lambotharan, Sangarapillai
    Kyriakopoulos, Konstantinos
    Ghafir, Ibrahim
    AsSadhan, Basil
    2019 11TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS AND SIGNAL PROCESSING (WCSP), 2019,
  • [26] Anomaly Detection Approach Using Adaptive Cumulative Sum Algorithm for Controller Area Network
    Olufowobi, Habeeb
    Ezeobi, Uchenna
    Muhati, Eric
    Robinson, Gaylon
    Young, Clinton
    Zambreno, Joseph
    Bloom, Gedare
    PROCEEDINGS OF THE ACM WORKSHOP ON AUTOMOTIVE CYBERSECURITY (AUTOSEC '19), 2019, : 25 - 30
  • [27] MSCA: An Unsupervised Anomaly Detection System for Network Security in Backbone Network
    Liu, Yating
    Gu, Yuantao
    Shen, Xinyue
    Liao, Qingmin
    Yu, Quan
    IEEE TRANSACTIONS ON NETWORK SCIENCE AND ENGINEERING, 2023, 10 (01): : 223 - 238
  • [28] Anomaly process detection using negative selection algorithm and classification techniques
    Hosseini, Soodeh
    Seilani, Hossein
    EVOLVING SYSTEMS, 2021, 12 (03) : 769 - 778
  • [29] USING R FOR ANOMALY DETECTION IN NETWORK TRAFFIC
    Hock, Denis
    Kappes, Martin
    PROCEEDINGS OF THE FIFTH INTERNATIONAL CONFERENCE ON INTERNET TECHNOLOGIES AND APPLICATIONS (ITA 13), 2013, : 98 - 105
  • [30] Network Anomaly Detection Using Federated Learning
    Marfo, William
    Tosh, Deepak K.
    Moore, Shirley V.
    2022 IEEE MILITARY COMMUNICATIONS CONFERENCE (MILCOM), 2022,