Network anomaly detection based on clustering of sequence patterns

被引:0
|
作者
Noh, Sang-Kyun
Kim, Yong-Min
Kim, DongKook
Noh, Bong-Nam [1 ]
机构
[1] Chonnam Natl Univ, Interdisciplinary Program Informat Secur, Kwangju 500757, South Korea
[2] Chonnam Natl Univ, Dept Elect Commerce, Yeosu 550749, South Korea
[3] Chonnam Natl Univ, Div Elect Comp & Informat Engn, Kwangju 500757, South Korea
来源
COMPUTATIONAL SCIENCE AND ITS APPLICATIONS - ICCSA 2006, PT 2 | 2006年 / 3981卷
关键词
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Anomaly detection is a method for determining behaviors which do not accord with normal ones. It is mostly used for detecting abnormal behaviors, mutational and unknown attacks. In this paper, we propose a technique that generates patterns about network-based normal behaviors in blocks of a TCP network session for the anomaly detection. One session is expressed as one pattern based on a stream of the packets in the session, and thus the pattern we generate has a sequential feature. We use the ROCK algorithm to cluster the sequence patterns which have categorical attributes. This algorithm performs clustering based on our similarity function which uses Dynamic Programming. The many sequence patterns of the normal behaviors can be reduced to several representative sequence patterns using the clustering. Our detecting sensor uses profiling dataset that are constructed by the representative sequence patterns of normal behaviors. We show the effectiveness of proposed model by using results from the 1999 DARPA Intrusion Detection Evaluation.
引用
收藏
页码:349 / 358
页数:10
相关论文
共 50 条
  • [1] Network anomaly detection based on DSOM and ACO clustering
    Feng, Yong
    Zhong, Jiang
    Xiong, Zhong-yang
    Ye, Chun-xiao
    Wu, Kai-gui
    ADVANCES IN NEURAL NETWORKS - ISNN 2007, PT 2, PROCEEDINGS, 2007, 4492 : 947 - +
  • [2] Research on network anomaly detection based on clustering and classifier
    Yang, Hongyu
    Xie, Feng
    Lu, Yi
    2006 INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY, PTS 1 AND 2, PROCEEDINGS, 2006, : 592 - 597
  • [3] Clustering-based label estimation for network anomaly detection
    Baek, Sunhee
    Kwon, Donghwoon
    Suh, Sang C.
    Kim, Hyunjoo
    Kim, Ikkyun
    Kim, Jinoh
    DIGITAL COMMUNICATIONS AND NETWORKS, 2021, 7 (01) : 37 - 44
  • [4] Fuzzified Cuckoo based Clustering Technique for Network Anomaly Detection
    Garg, Sahil
    Batra, Shalini
    COMPUTERS & ELECTRICAL ENGINEERING, 2018, 71 : 798 - 817
  • [5] A grid-based clustering algorithm for network anomaly detection
    Wei, Xiaotao
    Huang, Houkuan
    Tian, Shengfeng
    PROCEEDINGS OF THE FIRST INTERNATIONAL SYMPOSIUM ON DATA, PRIVACY, AND E-COMMERCE, 2007, : 104 - +
  • [6] Clustering-based label estimation for network anomaly detection
    Sunhee Baek
    Donghwoon Kwon
    Sang CSuh
    Hyunjoo Kim
    Ikkyun Kim
    Jinoh Kim
    Digital Communications and Networks, 2021, 7 (01) : 37 - 44
  • [7] Network anomaly detection based on semi-supervised clustering
    Wei Xiaotao
    Huang Houkuan
    Tian Shengfeng
    NEW ADVANCES IN SIMULATION, MODELLING AND OPTIMIZATION (SMO '07), 2007, : 440 - +
  • [8] Anomaly detection based on unsupervised niche clustering with application to network intrusion detection
    Leon, E
    Nasraoui, F
    Gomez, J
    CEC2004: PROCEEDINGS OF THE 2004 CONGRESS ON EVOLUTIONARY COMPUTATION, VOLS 1 AND 2, 2004, : 502 - 508
  • [9] A Membership Function for Feature Clustering Based Network Intrusion and Anomaly Detection
    Nagaraja, Arun
    Kumar, T. Satish
    ICEMIS'18: PROCEEDINGS OF THE FOURTH INTERNATIONAL CONFERENCE ON ENGINEERING AND MIS, 2018,
  • [10] Unsupervised Network Anomaly Detection Based on Abnormality Weights and Subspace Clustering
    Zhao, Xuanqiang
    Wang, Guoying
    Li, Zhixing
    2016 SIXTH INTERNATIONAL CONFERENCE ON INFORMATION SCIENCE AND TECHNOLOGY (ICIST), 2016, : 482 - 486