Neural projection techniques for the visual inspection of network traffic

被引:22
作者
Herrero, Alvaro [1 ]
Corchado, Emilio [1 ]
Gastaldo, Paolo [2 ]
Zunino, Rodolfo [2 ]
机构
[1] Univ Burgos, Dept Civil Engn, Burgos 09006, Spain
[2] Univ Genoa, Dept Biophys & Elect Engn DIBE, I-16145 Genoa, Italy
关键词
Neural projection models; Network traffic monitoring; Computer network security; PRINCIPAL COMPONENT ANALYSIS; INTRUSION DETECTION; ANOMALY DETECTION; VISUALIZATION; ALGORITHM; PURSUIT;
D O I
10.1016/j.neucom.2008.12.038
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
A crucial aspect in network monitoring for security purposes is the visual inspection of the traffic pattern, mainly aimed to provide the network manager with a synthetic and intuitive representation of the current situation. Towards that end, neural projection techniques can map high-dimensional data into a low-dimensional space adaptively, for the user-friendly visualization of monitored network traffic. This work proposes two projection methods, namely, cooperative maximum likelihood Hebbian learning and auto-associative back-propagation networks, for the visual inspection of network traffic. This set of methods may be seen as a complementary tool in network security as it allows the visual inspection and comprehension of the traffic data internal structure. The proposed methods have been evaluated in two complementary and practical network-security scenarios: the on-line processing of network traffic at packet level, and the off-line processing of connection records, e.g. for post-mortem analysis or batch investigation. The empirical verification of the projection methods involved two experimental domains derived from the standard corpora for evaluation of Computer network intrusion detection: the MIT Lincoln Laboratory DARPA dataset. (C) 2009 Elsevier B.V. All rights reserved.
引用
收藏
页码:3649 / 3658
页数:10
相关论文
共 67 条
[1]   Intrusion detection using a fuzzy genetics-based learning algorithm [J].
Abadeh, M. Sanlee ;
Habibi, J. ;
Lucas, C. .
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2007, 30 (01) :414-428
[2]   Visualizing network data for intrusion detection [J].
Abdullah, K ;
Lee, A ;
Conti, G ;
Copeland, JA .
PROCEEDINGS FROM THE SIXTH ANNUAL IEEE SYSTEMS, MAN AND CYBERNETICS INFORMATION ASSURANCE WORKSHOP, 2005, :100-108
[3]   AN EFFICIENT IMPLEMENTATION OF BP ON RISC-BASED WORKSTATIONS [J].
ANGUITA, D ;
PARODI, G ;
ZUNINO, R .
NEUROCOMPUTING, 1994, 6 (01) :57-65
[4]  
Ankerst M., 2000, Proceedings. KDD-2000. Sixth ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, P179, DOI 10.1145/347090.347124
[5]  
[Anonymous], 2006, ANN TELECOMMUN
[6]  
[Anonymous], 1994, Multidimensional Scaling
[7]  
[Anonymous], 2002, ADV INF SECUR
[8]  
Bace R., 2001, NIST Special Publication on Intrusion Detection Systems
[9]   VISUALIZING NETWORK DATA [J].
BECKER, RA ;
EICK, SG ;
WILKS, AR .
IEEE TRANSACTIONS ON VISUALIZATION AND COMPUTER GRAPHICS, 1995, 1 (01) :16-28
[10]  
Corchado E, 2005, LECT NOTES COMPUT SC, V3697, P905