Go With the Flow: Clustering Dynamically-Defined NetFlow Features for Network Intrusion Detection with DYNIDS

被引:1
|
作者
Dias, Luis [1 ,2 ]
Valente, Simao [1 ,2 ]
Correia, Miguel [2 ]
机构
[1] Inst Univ Mil, Acad Mil, CINAMIL, Lisbon, Portugal
[2] Univ Lisbon, Inst Super Tecn, INESC ID, Lisbon, Portugal
来源
2020 IEEE 19TH INTERNATIONAL SYMPOSIUM ON NETWORK COMPUTING AND APPLICATIONS (NCA) | 2020年
关键词
network intrusion detection; clustering; feature engineering; security analytics; ANOMALY DETECTION;
D O I
10.1109/nca51143.2020.9306732
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The paper presents DYNIDS, a network intrusion detection approach that flags malicious activity without previous knowledge about attacks or training data. DYNIDS dynamically defines and extracts features from network data, and uses clustering algorithms to aggregate hosts with similar behavior. All previous clustering-based network intrusion detection approaches use a static set of features, restricting their ability to detect certain attacks. Instead, we use a set of features defined dynamically, at runtime, avoiding that restriction without falling into the curse of dimensionality, something that we believe is essential for the adoption of this kind of approaches. We evaluated DYNIDS experimentally with an evaluation and a real-world dataset, obtaining better F-Score than alternative solutions.
引用
收藏
页数:10
相关论文
共 50 条
  • [21] FlowGANAnomaly: Flow-Based Anomaly Network Intrusion Detection with Adversarial Learning
    Li, Zeyi
    Wang, Pan
    Wang, Zixuan
    Zhan, De-chuan
    CHINESE JOURNAL OF ELECTRONICS, 2024, 33 (01) : 58 - 71
  • [22] Explainable Boosting Machines for Network Intrusion Detection with Features Reduction
    El-Mihoub, Tarek A.
    Nolle, Lars
    Stahl, Frederic
    ARTIFICIAL INTELLIGENCE XXXIX, AI 2022, 2022, 13652 : 280 - 294
  • [23] Network Intrusion Detection via Flow-to-Image Conversion and Vision Transformer Classification
    Ho, Chi Mai Kim
    Yow, Kin-Choong
    Zhu, Zhongwen
    Aravamuthan, Sarang
    IEEE ACCESS, 2022, 10 : 97780 - 97793
  • [24] Network Intrusion Detection: Based on Deep Hierarchical Network and original Flow Data
    Zhang, Yong
    Chen, Xu
    Jin, Lei
    Wang, Xiaojuan
    Guo, Da
    IEEE ACCESS, 2019, 7 : 37004 - 37016
  • [25] A Weighted Support Vector Clustering Algorithm and its Application in Network Intrusion Detection
    Sun, Sheng
    Wang, YuanZhen
    PROCEEDINGS OF THE FIRST INTERNATIONAL WORKSHOP ON EDUCATION TECHNOLOGY AND COMPUTER SCIENCE, VOL I, 2009, : 352 - +
  • [26] Suspicious Flow Forwarding for Multiple Intrusion Detection Systems on Software-Defined Networks
    Ha, Taejin
    Yoon, Seunghyun
    Risdianto, Aris Cahyadi
    Kim, JongWon
    Lim, Hyuk
    IEEE NETWORK, 2016, 30 (06): : 22 - 27
  • [27] Using Approximation of Standard Deviation and Variance in Flow Features for Efficient Intrusion Detection
    Puselj, Dora
    Katic, Lovro
    Ostroski, Dominik
    Brajdic, Ivona
    Slovenec, Karlo
    PROCEEDINGS OF THE 16TH INTERNATIONAL CONFERENCE ON TELECOMMUNICATIONS (CONTEL 2021), 2021, : 129 - 133
  • [28] Application of Network Intrusion Detection Based on Fuzzy C-Means Clustering Algorithm
    Ren, Wuling
    Cao, Jinzhu
    Wu, Xianjie
    2009 THIRD INTERNATIONAL SYMPOSIUM ON INTELLIGENT INFORMATION TECHNOLOGY APPLICATION, VOL 3, PROCEEDINGS, 2009, : 19 - +
  • [29] Flow-based intrusion detection on software-defined networks: a multivariate time series anomaly detection approach
    Zavrak, Sultan
    Iskefiyeli, Murat
    NEURAL COMPUTING & APPLICATIONS, 2023, 35 (16) : 12175 - 12193
  • [30] Flow-based intrusion detection on software-defined networks: a multivariate time series anomaly detection approach
    Sultan Zavrak
    Murat Iskefiyeli
    Neural Computing and Applications, 2023, 35 : 12175 - 12193