Detecting Anomalous Latent Classes in a Batch of Network Traffic Flows

被引:0
|
作者
Kocak, Fatih [1 ]
Miller, David J.
Kesidis, George
机构
[1] Penn State Univ, EE Dept, University Pk, PA 16802 USA
来源
2014 48TH ANNUAL CONFERENCE ON INFORMATION SCIENCES AND SYSTEMS (CISS) | 2014年
关键词
anomaly detection; clustering; intrusion detection; mixture models; feature selection; p-value; one-class SVM;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
We focus on detecting samples from anomalous latent classes, "buried" within a collected batch of known ("normal") class samples. In our setting, the number of features for each sample is high. We posit and observe to be true that careful "feature selection" within unsupervised anomaly detection may be needed to achieve the most accurate results. Our approach effectively selects features (tests), even though there are no labeled anomalous examples available to form a basis for standard (supervised) feature selection. We form pairwise feature tests based on bivariate Gaussian mixture null models, with one test for every pair of features. The mixtures are estimated using known class samples (null "training set"). Then, we obtain p-values on the test batch samples under the null hypothesis. Subsequently, we calculate approximate joint p-values for candidate anomalous clusters, defined by (sample subset, test subset) pairs. Our approach sequentially detects the most significant clusters of samples in a networking context. We compare our "p-value clustering algorithm", using ROC curves, with alternative p-value based methods and with the one-class SVM. All the competing methods make sample-wise detections, i.e. they do not jointly detect anomalous clusters. The anomalous class was either an HTTP bot (Zeus) or peer-to-peer (P2P) traffic. Our p-value clustering approach gives promising results for detecting the Zeus bot and P2P traffic amongst Web.
引用
收藏
页数:6
相关论文
共 50 条
  • [31] A new statistical method for detecting network anomalies in TCP traffic
    Callegari, Christian
    Vaton, Sandrine
    Pagano, Michele
    EUROPEAN TRANSACTIONS ON TELECOMMUNICATIONS, 2010, 21 (07): : 575 - 588
  • [32] Detecting Web Attacks in Severely Imbalanced Network Traffic Data
    Zuech, Richard
    Hancock, John
    Khoshgoftaar, Taghi M.
    2021 IEEE 22ND INTERNATIONAL CONFERENCE ON INFORMATION REUSE AND INTEGRATION FOR DATA SCIENCE (IRI 2021), 2021, : 267 - 273
  • [33] Detecting Distributed Denial of Service in Network Traffic with Deep Learning
    Rusyaidi, Muhammad
    Jaf, Sardar
    Ibrahim, Zunaidi
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2022, 13 (01) : 34 - 41
  • [34] Detecting Network Traffic Intrusions on Memory Constrained Embedded Systems
    Su, Shiyu
    Nwafor, Ebelechukwu
    2021 IEEE VIRTUAL IEEE INTERNATIONAL SYMPOSIUM ON TECHNOLOGIES FOR HOMELAND SECURITY, 2021,
  • [35] Detecting spoofing and anomalous traffic in wireless networks via forge-resistant relationships
    Li, Qing
    Trappe, Wade
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2007, 2 (04) : 793 - 808
  • [36] Detecting anomalous traders using multi-slice network analysis
    Sun, Xiao-Qian
    Shen, Hua-Wei
    Cheng, Xue-Qi
    Zhang, Yuqing
    PHYSICA A-STATISTICAL MECHANICS AND ITS APPLICATIONS, 2017, 473 : 1 - 9
  • [37] Detecting Anomalies in Network Traffic Using the Method of Remaining Elements
    Velarde-Alvarado, P.
    Vargas-Rosales, C.
    Torres-Roman, D.
    Martinez-Heffera, A.
    IEEE COMMUNICATIONS LETTERS, 2009, 13 (06) : 462 - 462
  • [38] Data Analytics on Network Traffic Flows for Botnet Behaviour Detection
    Le, Duc C.
    Zincir-Heywood, A. Nur
    Heywood, Malcolm I.
    PROCEEDINGS OF 2016 IEEE SYMPOSIUM SERIES ON COMPUTATIONAL INTELLIGENCE (SSCI), 2016,
  • [39] Detecting Malign Encrypted Network Traffic Using Perlin Noise and Convolutional Neural Network
    Bazuhair, Wajdi
    Lee, Wonjun
    2020 10TH ANNUAL COMPUTING AND COMMUNICATION WORKSHOP AND CONFERENCE (CCWC), 2020, : 200 - 206
  • [40] Detecting anomalous traffic behaviors with seasonal deep Kalman filter graph convolutional neural networks
    Sun, Yanshen
    Lu, Yen-Cheng
    Fu, Kaiqun
    Chen, Fanglan
    Lu, Chang -Tien
    JOURNAL OF KING SAUD UNIVERSITY-COMPUTER AND INFORMATION SCIENCES, 2022, 34 (08) : 4729 - 4742