Application of Local Outlier Factor Algorithm to Detect Anomalies in Computer Network

被引:24
作者
Auskalnis, Juozas [1 ]
Paulauskas, Nerijus [1 ,2 ]
Baskys, Algirdas [1 ,2 ]
机构
[1] Vilnius Gediminas Tech Univ, Dept Comp Sci & Commun Technol, Naugarduko St 41, LT-03227 Vilnius, Lithuania
[2] Ctr Phys Sci & Technol, Sauletekio Al 3, LT-10257 Vilnius, Lithuania
关键词
Intrusion detection; Anomaly detection; Local outlier factor;
D O I
10.5755/j01.eie.24.3.20972
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Gap between the new attack appearance and signature creation for this attack may be critical. During this time, many computer systems may be affected and valuable resources may be lost. Even after signature creation, many computer systems still stay vulnerable because of bad security practice, i.e. patches and updates are not installed as needed. Therefore, anomaly intrusion detection system (IDS) that is capable to detect new unknown attacks is valuable security tool. This paper analyses the use of Local Outlier Factor (LOF) to detect anomalies in the computer network. The application of the LOF algorithm for the detection of anomalies when only normal network data are used for the model training has been demonstrated. Experimental results of different threshold values influence on the anomaly detection accuracy using NSL-KDD dataset is presented.
引用
收藏
页码:96 / 99
页数:4
相关论文
共 9 条
[1]   Network Anomaly Detection: Methods, Systems and Tools [J].
Bhuyan, Monowar H. ;
Bhattacharyya, D. K. ;
Kalita, J. K. .
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2014, 16 (01) :303-336
[2]   LOF: Identifying density-based local outliers [J].
Breunig, MM ;
Kriegel, HP ;
Ng, RT ;
Sander, J .
SIGMOD RECORD, 2000, 29 (02) :93-104
[3]   An LOF-based Adaptive Anomaly Detection Scheme for Cloud Computing [J].
Huang, Tian ;
Zhu, Yan ;
Zhang, Qiannan ;
Zhu, Yongxin ;
Wang, Dongyang ;
Qiu, Meikang ;
Liu, Lei .
2013 IEEE 37TH ANNUAL COMPUTER SOFTWARE AND APPLICATIONS CONFERENCE WORKSHOPS (COMPSACW), 2013, :206-211
[4]  
Lippmann R.P., 2000, P DARPA INF SURV C E, V2, P12, DOI DOI 10.1109/DISCEX.2000.821506
[5]  
Maheshkumar Sabhnani, 2004, Intelligent Data Analysis, V8, P403
[6]  
Paulauskas N., 2017, 2017 Open Conference of Electrical, Electronic and Information Sciences, P1
[7]   Incremental local outlier detection for data streams [J].
Pokrajac, Dragojub ;
Lazarevic, Aleksandar ;
Latecki, Longin Jan .
2007 IEEE SYMPOSIUM ON COMPUTATIONAL INTELLIGENCE AND DATA MINING, VOLS 1 AND 2, 2007, :504-515
[8]  
Tavallace M, 2009, P IEEE S COMP INT SE, P1, DOI [DOI 10.1109/CISDA.2009.5356528, 10.1109/CISDA.2009.5356528]
[9]  
Zhang JL, 2017, 2017 SYSTEMS AND INFORMATION ENGINEERING DESIGN SYMPOSIUM (SIEDS), P122, DOI 10.1109/SIEDS.2017.7937701