Detecting Anomalous Latent Classes in a Batch of Network Traffic Flows

被引:0
|
作者
Kocak, Fatih [1 ]
Miller, David J.
Kesidis, George
机构
[1] Penn State Univ, EE Dept, University Pk, PA 16802 USA
来源
2014 48TH ANNUAL CONFERENCE ON INFORMATION SCIENCES AND SYSTEMS (CISS) | 2014年
关键词
anomaly detection; clustering; intrusion detection; mixture models; feature selection; p-value; one-class SVM;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
We focus on detecting samples from anomalous latent classes, "buried" within a collected batch of known ("normal") class samples. In our setting, the number of features for each sample is high. We posit and observe to be true that careful "feature selection" within unsupervised anomaly detection may be needed to achieve the most accurate results. Our approach effectively selects features (tests), even though there are no labeled anomalous examples available to form a basis for standard (supervised) feature selection. We form pairwise feature tests based on bivariate Gaussian mixture null models, with one test for every pair of features. The mixtures are estimated using known class samples (null "training set"). Then, we obtain p-values on the test batch samples under the null hypothesis. Subsequently, we calculate approximate joint p-values for candidate anomalous clusters, defined by (sample subset, test subset) pairs. Our approach sequentially detects the most significant clusters of samples in a networking context. We compare our "p-value clustering algorithm", using ROC curves, with alternative p-value based methods and with the one-class SVM. All the competing methods make sample-wise detections, i.e. they do not jointly detect anomalous clusters. The anomalous class was either an HTTP bot (Zeus) or peer-to-peer (P2P) traffic. Our p-value clustering approach gives promising results for detecting the Zeus bot and P2P traffic amongst Web.
引用
收藏
页数:6
相关论文
共 50 条
  • [21] Detecting anomalous traffic using statistical processing and self-organizing maps
    Baldassari, Paola
    Montesanto, Anna
    Puliti, Paolo
    SECRYPT 2007: PROCEEDINGS OF THE SECOND INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY, 2007, : 74 - 79
  • [22] RESNETCNN:an Abnormal Network Traffic Flows Detection Model
    Li, Yimin
    Han, Dezhi
    Cui, Mingming
    Yuan, Fan
    Zhou, Yachao
    COMPUTER SCIENCE AND INFORMATION SYSTEMS, 2023, 20 (03) : 997 - 1014
  • [23] Utilizing Deep Learning Techniques to Detect Zero Day Exploits in Network Traffic Flows
    Drozdenko, Benjamin
    Powell, Makia
    2022 IEEE 13TH ANNUAL UBIQUITOUS COMPUTING, ELECTRONICS & MOBILE COMMUNICATION CONFERENCE (UEMCON), 2022, : 163 - 172
  • [24] Detecting network attacks in the Internet via statistical network traffic normality prediction
    Jiang J.
    Papavassiliou S.
    Journal of Network and Systems Management, 2004, 12 (1) : 51 - 72
  • [25] Detecting Distributed Network Traffic Anomaly with Network-Wide Correlation Analysis
    Li Zonglin
    Hu Guangmin
    Yao Xingmiao
    Yang Dan
    EURASIP Journal on Advances in Signal Processing, 2009
  • [26] Detecting Network Scanning Through Monitoring and Manipulation of DNS Traffic
    Jafarian, Jafar Haadi
    Abolfathi, Masoumeh
    Rahimian, Mahsa
    IEEE ACCESS, 2023, 11 : 20267 - 20283
  • [27] Detecting anomalous behavior in sea traffic: A study of analytical strategies and their implications for surveillance systems
    Riveiro, Maria
    Falkman, Goran
    INTERNATIONAL JOURNAL OF INFORMATION TECHNOLOGY & DECISION MAKING, 2014, 13 (02) : 317 - 360
  • [28] HollywooDDoS: Detecting Volumetric Attacks in Moving Images of Network Traffic
    Kopmann, Samuel
    Heseding, Hauke
    Zitterbart, Martina
    PROCEEDINGS OF THE 2022 47TH IEEE CONFERENCE ON LOCAL COMPUTER NETWORKS (LCN 2022), 2022, : 90 - 97
  • [29] Anomaly-Based Method for Detecting Multiple Classes of Network Attacks
    Gurina, Anastasia
    Eliseev, Vladimir
    INFORMATION, 2019, 10 (03)
  • [30] Detecting Heavy Change in the Heavy Hitter Distribution of Network Traffic
    Callegari, Christian
    Giordano, Stefano
    Pagano, Michele
    Pepe, Teresa
    2011 7TH INTERNATIONAL WIRELESS COMMUNICATIONS AND MOBILE COMPUTING CONFERENCE (IWCMC), 2011, : 1298 - 1303