A multi-step outlier-based anomaly detection approach to network-wide traffic

被引:69
作者
Bhuyan, Monowar H. [1 ]
Bhattacharyya, D. K. [2 ]
Kalita, J. K. [3 ]
机构
[1] Kaziranga Univ, Dept Comp Sci & Engn, Jorhat 785006, Assam, India
[2] Tezpur Univ, Dept Comp Sci & Engn, Tezpur 784028, Assam, India
[3] Univ Colorado, Dept Comp Sci, Colorado Springs, CO 80933 USA
关键词
Anomaly detection; Network-wide traffic; Clustering; Reference point; Outlier score; INTRUSION DETECTION; PERFORMANCE; SETS;
D O I
10.1016/j.ins.2016.02.023
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Outlier detection is of considerable interest in fields such as physical sciences, medical diagnosis, surveillance detection, fraud detection and network anomaly detection. The data mining and network management research communities are interested in improving existing score-based network traffic anomaly detection techniques because of ample scopes to increase performance. In this paper, we present a multi-step outlier-based approach for detection of anomalies in network-wide traffic. We identify a subset of relevant traffic features and use it during clustering and anomaly detection. To support outlier-based network anomaly identification, we use the following modules: a mutual information and generalized entropy based feature selection technique to select a relevant non-redundant subset of features, a tree-based clustering technique to generate a set of reference points and an outlier score function to rank incoming network traffic to identify anomalies. We also design a fast distributed feature extraction and data preparation framework to extract features from raw network-wide traffic. We evaluate our approach in terms of detection rate, false positive rate, precision, recall and F-measure using several high dimensional synthetic and real-world datasets and find the performance superior in comparison to competing algorithms. (C) 2016 Elsevier Inc. All rights reserved.
引用
收藏
页码:243 / 271
页数:29
相关论文
共 60 条
[1]   Local Subspace Based Outlier Detection [J].
Agrawal, Ankur .
CONTEMPORARY COMPUTING, PROCEEDINGS, 2009, 40 :149-157
[2]   Mutual information-based feature selection for intrusion detection systems [J].
Amiri, Fatemeh ;
Yousefi, MohammadMahdi Rezaei ;
Lucas, Caro ;
Shakery, Azadeh ;
Yazdani, Nasser .
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2011, 34 (04) :1184-1199
[3]   Distance-based detection and prediction of outliers [J].
Angiulli, F ;
Basta, S ;
Pizzuti, C .
IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, 2006, 18 (02) :145-160
[4]  
[Anonymous], 2009, FINDING GROUPS DATA
[5]  
[Anonymous], 2004, NEXT GENERATION DATA
[6]  
[Anonymous], 2012, Proceedings of the fifth ACM international conference on Web search and data mining
[7]  
Bache K., 2013, UCI Machine Learning Repository
[8]  
Barbara D., 2001, P 1 SIAM C DAT MIN C
[9]  
Barbara Daniel., 2001, P IEEE WORKSHOP INFO, P11
[10]  
Bay S.D, 2003, KDD 03, P29, DOI [10.1145/956750.956758, DOI 10.1145/956750.956758]