Detecting Anomalous Latent Classes in a Batch of Network Traffic Flows

被引:0
|
作者
Kocak, Fatih [1 ]
Miller, David J.
Kesidis, George
机构
[1] Penn State Univ, EE Dept, University Pk, PA 16802 USA
来源
2014 48TH ANNUAL CONFERENCE ON INFORMATION SCIENCES AND SYSTEMS (CISS) | 2014年
关键词
anomaly detection; clustering; intrusion detection; mixture models; feature selection; p-value; one-class SVM;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
We focus on detecting samples from anomalous latent classes, "buried" within a collected batch of known ("normal") class samples. In our setting, the number of features for each sample is high. We posit and observe to be true that careful "feature selection" within unsupervised anomaly detection may be needed to achieve the most accurate results. Our approach effectively selects features (tests), even though there are no labeled anomalous examples available to form a basis for standard (supervised) feature selection. We form pairwise feature tests based on bivariate Gaussian mixture null models, with one test for every pair of features. The mixtures are estimated using known class samples (null "training set"). Then, we obtain p-values on the test batch samples under the null hypothesis. Subsequently, we calculate approximate joint p-values for candidate anomalous clusters, defined by (sample subset, test subset) pairs. Our approach sequentially detects the most significant clusters of samples in a networking context. We compare our "p-value clustering algorithm", using ROC curves, with alternative p-value based methods and with the one-class SVM. All the competing methods make sample-wise detections, i.e. they do not jointly detect anomalous clusters. The anomalous class was either an HTTP bot (Zeus) or peer-to-peer (P2P) traffic. Our p-value clustering approach gives promising results for detecting the Zeus bot and P2P traffic amongst Web.
引用
收藏
页数:6
相关论文
共 50 条
  • [1] Hierarchical Neural Networks for Detecting Anomalous Traffic Flows
    Ryu, Seung-Jin
    Go, Wooyoung
    Lee, Daewoo
    Yoon, Han-Jun
    2019 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM), 2019,
  • [2] Detecting anomalous network traffic with self-organizing maps
    Ramadas, M
    Ostermann, S
    Tjaden, B
    RECENT ADVANCES IN INTRUSION DETECTION, PROCEEDINGS, 2003, 2820 : 36 - 54
  • [3] Detecting Anomalous Network Traffic in IoT Networks
    Dang Hai Hoang
    Ha Duong Nguyen
    2019 21ST INTERNATIONAL CONFERENCE ON ADVANCED COMMUNICATION TECHNOLOGY (ICACT): ICT FOR 4TH INDUSTRIAL REVOLUTION, 2019, : 1143 - 1152
  • [4] Detecting botnet by anomalous traffic
    Chen, Chia-Mei
    Lin, Hsiao-Chung
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2015, 21 : 42 - 51
  • [5] FlowHacker: Detecting Unknown Network Attacks in Big Traffic Data using Network Flows
    Sacramento, Luis
    Medeiros, Iberia
    Bota, Joao
    Correial, Miguel
    2018 17TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (IEEE TRUSTCOM) / 12TH IEEE INTERNATIONAL CONFERENCE ON BIG DATA SCIENCE AND ENGINEERING (IEEE BIGDATASE), 2018, : 567 - 572
  • [6] Why so abnormal? Detecting domains receiving anomalous surge traffic in a monitored network
    Ashok, Aravind
    Poornachandran, Prabaharan
    Pal, Soumajit
    Sankar, Prem
    Surendran, K.
    JOURNAL OF INTELLIGENT & FUZZY SYSTEMS, 2017, 32 (04) : 2901 - 2907
  • [7] An Adaptive Profile-Based Approach for Detecting Anomalous Traffic in Backbone
    Zang, Xiao-Dong
    Gong, Jian
    Hu, Xiao-Yan
    IEEE ACCESS, 2019, 7 : 56920 - 56934
  • [8] One-Class LSTM Network for Anomalous Network Traffic Detection
    Li, Yanmiao
    Xu, Yingying
    Cao, Yankun
    Hou, Jiangang
    Wang, Chun
    Guo, Wei
    Li, Xin
    Xin, Yang
    Liu, Zhi
    Cui, Lizhen
    APPLIED SCIENCES-BASEL, 2022, 12 (10):
  • [9] Intrusion Detection Using Clustering of Network Traffic Flows
    Bailey, Matthew
    Collins, Connor
    Sinda, Matthew
    Hu, Gongzhu
    2017 18TH IEEE/ACIS INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING, ARTIFICIAL INTELLIGENCE, NETWORKING AND PARALLEL/DISTRIBUTED COMPUTING (SNDP 2017), 2017, : 615 - 620
  • [10] Batch Discovery of Recurring Rare Classes toward Identifying Anomalous Samples
    Dundar, Murat
    Yerebakan, Halid Ziya
    Rajwa, Bartek
    PROCEEDINGS OF THE 20TH ACM SIGKDD INTERNATIONAL CONFERENCE ON KNOWLEDGE DISCOVERY AND DATA MINING (KDD'14), 2014, : 223 - 232