Detecting Anomalous Latent Classes in a Batch of Network Traffic Flows

被引:0
|
作者
Kocak, Fatih [1 ]
Miller, David J.
Kesidis, George
机构
[1] Penn State Univ, EE Dept, University Pk, PA 16802 USA
来源
2014 48TH ANNUAL CONFERENCE ON INFORMATION SCIENCES AND SYSTEMS (CISS) | 2014年
关键词
anomaly detection; clustering; intrusion detection; mixture models; feature selection; p-value; one-class SVM;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
We focus on detecting samples from anomalous latent classes, "buried" within a collected batch of known ("normal") class samples. In our setting, the number of features for each sample is high. We posit and observe to be true that careful "feature selection" within unsupervised anomaly detection may be needed to achieve the most accurate results. Our approach effectively selects features (tests), even though there are no labeled anomalous examples available to form a basis for standard (supervised) feature selection. We form pairwise feature tests based on bivariate Gaussian mixture null models, with one test for every pair of features. The mixtures are estimated using known class samples (null "training set"). Then, we obtain p-values on the test batch samples under the null hypothesis. Subsequently, we calculate approximate joint p-values for candidate anomalous clusters, defined by (sample subset, test subset) pairs. Our approach sequentially detects the most significant clusters of samples in a networking context. We compare our "p-value clustering algorithm", using ROC curves, with alternative p-value based methods and with the one-class SVM. All the competing methods make sample-wise detections, i.e. they do not jointly detect anomalous clusters. The anomalous class was either an HTTP bot (Zeus) or peer-to-peer (P2P) traffic. Our p-value clustering approach gives promising results for detecting the Zeus bot and P2P traffic amongst Web.
引用
收藏
页数:6
相关论文
共 50 条
  • [41] Improvement the schemes and models of detecting network traffic anomalies on computer systems
    Yusupdjanovich, Yusupov Sabirjan
    Rajaboevich, Gulomov Sherzod
    2020 IEEE 14TH INTERNATIONAL CONFERENCE ON APPLICATION OF INFORMATION AND COMMUNICATION TECHNOLOGIES (AICT2020), 2020,
  • [42] Unsupervised Approach for Detecting Low Rate Attacks on Network Traffic with Autoencoder
    Pratomo, Baskoro Adi
    Burnap, Pete
    Theodorakopoulos, George
    2018 INTERNATIONAL CONFERENCE ON CYBER SECURITY AND PROTECTION OF DIGITAL SERVICES (CYBER SECURITY), 2018,
  • [43] A Bootstrap-based Simple Probability Model for Classifying Network Traffic and Detecting Network Intrusion
    Yun Wang
    Inyoung Kim
    Security Journal, 2008, 21 : 278 - 290
  • [44] A Bootstrap-based Simple Probability Model for Classifying Network Traffic and Detecting Network Intrusion
    Wang, Yun
    Kim, Inyoung
    SECURITY JOURNAL, 2008, 21 (04) : 278 - 290
  • [45] Anomalous distributed traffic: Detecting cyber security attacks amongst microservices using graph convolutional networks
    Jacob, Stephen
    Qiao, Yuansong
    Ye, Yuhang
    Lee, Brian
    COMPUTERS & SECURITY, 2022, 118
  • [46] BotCapturer: Detecting botnets based on two-layered analysis with graph anomaly detection and network traffic clustering
    Wang W.
    Wang Y.
    Tan X.
    Liu Y.
    Yang S.
    Wang, Wei (wangwei1@bjtu.edu.cn), 2018, Totem Publishers Ltd (14) : 1050 - 1059
  • [47] A Traffic Decomposition and Prediction Method for Detecting and Tracing Network-Wide Anomalies
    Du, Ping
    Abe, Shunji
    Ji, Yusheng
    Sato, Seisho
    Ishiguro, Makio
    IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2009, E92D (05) : 929 - 936
  • [48] Detecting weak dependence in computer network traffic patterns by using higher criticism
    Price-Williams, Matthew
    Heard, Nick
    Rubin-Delanchy, Patrick
    JOURNAL OF THE ROYAL STATISTICAL SOCIETY SERIES C-APPLIED STATISTICS, 2019, 68 (03) : 641 - 655
  • [49] An Online Offline Framework for Anomaly Scoring and Detecting New Traffic in Network Streams
    Odiathevar, Murugaraj
    Seah, Winston K. G.
    Frean, Marcus
    Valera, Alvin
    IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, 2022, 34 (11) : 5166 - 5181
  • [50] A novel approach for performance-based clustering and management of network traffic flows
    Al-Saadi, Muna
    Ghita, Bogdan V.
    Shiaeles, Stavros
    Sarigiannidis, Panagiotis
    2019 15TH INTERNATIONAL WIRELESS COMMUNICATIONS & MOBILE COMPUTING CONFERENCE (IWCMC), 2019, : 2025 - 2030