FlowSpectrum: a concrete characterization scheme of network traffic behavior for anomaly detection

被引:6
作者
Yang, Luming [1 ]
Fu, Shaojing [1 ]
Zhang, Xuyun [2 ]
Guo, Shize [3 ]
Wang, Yongjun [1 ]
Yang, Chi [4 ]
机构
[1] Natl Univ Def Technol, Changsha, Peoples R China
[2] Natl Res Ctr Informat Technol Secur, Beijing, Peoples R China
[3] Macquarie Univ, Sydney, NSW, Australia
[4] Huazhong Univ Sci & Technol, Beijing, Peoples R China
来源
WORLD WIDE WEB-INTERNET AND WEB INFORMATION SYSTEMS | 2022年 / 25卷 / 05期
基金
澳大利亚研究理事会;
关键词
FlowSpectrum; Network flow analysis; Anomaly detection; Characterization; INTRUSION DETECTION METHOD; CLASSIFICATION; VISUALIZATION;
D O I
10.1007/s11280-022-01057-8
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
As the 5G rolls out around the world, many edge applications will be deployed by app vendors and accessed by massive end-users. Efficient detection of malicious network behavior is paid more and more attention. The current traffic detection work is still stuck on the analysis of high-dimensional data. It will restrict the improvement of threat monitoring and network governance when facing massive network flows. Characterization of network flows within simple domains is required to simplify the process of network analysis. Traffic characterization is a key task that allows service providers to detect and intercept anomalous traffic, such that high QoS (Quality of Service) and service availability are maintained and spread of malicious content is prevented. Unfortunately, there is still a lack of research on the concrete characterization of network data. Analogous to spectrum, in this paper, we proposed the concept of FlowSpectrum for the first time in order to represent the network flow, concretely. In the FlowSpectrum, network flow is represented as a spectral line rather than the raw data or a feature vector of the network flow. All flows are able to be mapped as spectral lines, and traffic identification is achieved by analyzing the positions of spectral lines. FlowSpectrum can significantly reduce the complexity of network traffic behavior analysis while enhancing the interpretability of detection and facilitating cyberspace behavior management. We designed a neural network structure based on semi-supervised AutoEncoder for decomposition and dimensionality reduction of network flows in FlowSpectrum. The characterization capability of FlowSpectrum is proved by thorough experiments. Moreover, we realized the correspondence between network behaviors and intervals of spectral lines, preliminarily. Generally speaking, FlowSpectrum can provide new ideas for the field of network traffic analysis.
引用
收藏
页码:2139 / 2161
页数:23
相关论文
共 41 条
  • [21] Korczynski M, 2014, IEEE INFOCOM SER, P781, DOI 10.1109/INFOCOM.2014.6848005
  • [22] Characterization of Tor Traffic using Time based Features
    Lashkari, Arash Habibi
    Gil, Gerard Draper
    Mamun, Mohammad Saiful Islam
    Ghorbani, Ali A.
    [J]. ICISSP: PROCEEDINGS OF THE 3RD INTERNATIONAL CONFERENCE ON INFORMATION SYSTEMS SECURITY AND PRIVACY, 2017, : 253 - 262
  • [23] Liu C., 2018, 2018 IEEE/ACM 26th International Symposium on Quality of Service (IWQoS), P1
  • [24] McHugh J., 2000, ACM Transactions on Information and Systems Security, V3, P262, DOI 10.1145/382912.382923
  • [25] WENC: HTTPS Encrypted Traffic Classification Using Weighted Ensemble Learning and Markov Chain
    Pan, Wubin
    Cheng, Gaung
    Tang, Yongning
    [J]. 2017 16TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS / 11TH IEEE INTERNATIONAL CONFERENCE ON BIG DATA SCIENCE AND ENGINEERING / 14TH IEEE INTERNATIONAL CONFERENCE ON EMBEDDED SOFTWARE AND SYSTEMS, 2017, : 50 - 57
  • [26] Visualization of big data security: a case study on the KDD99 cup data set
    Ruan, Zichan
    Miao, Yuantian
    Pan, Lei
    Patterson, Nicholas
    Zhang, Jun
    [J]. DIGITAL COMMUNICATIONS AND NETWORKS, 2017, 3 (04) : 250 - 259
  • [27] Santos ACF., 2011, J COMPUTATIONAL INTE, V2, P197
  • [28] Shapira T, 2019, IEEE CONF COMPUT, P680, DOI [10.1109/infcomw.2019.8845315, 10.1109/INFCOMW.2019.8845315]
  • [29] Classification of Encrypted Traffic With Second-Order Markov Chains and Application Attribute Bigrams
    Shen, Meng
    Wei, Mingwei
    Zhu, Liehuang
    Wang, Mingzhong
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2017, 12 (08) : 1830 - 1843
  • [30] Siva SDS., 2011, INT J COMPUTER APPL, V31, P1