Detecting Anomalous Latent Classes in a Batch of Network Traffic Flows

被引:0
|
作者
Kocak, Fatih [1 ]
Miller, David J.
Kesidis, George
机构
[1] Penn State Univ, EE Dept, University Pk, PA 16802 USA
来源
2014 48TH ANNUAL CONFERENCE ON INFORMATION SCIENCES AND SYSTEMS (CISS) | 2014年
关键词
anomaly detection; clustering; intrusion detection; mixture models; feature selection; p-value; one-class SVM;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
We focus on detecting samples from anomalous latent classes, "buried" within a collected batch of known ("normal") class samples. In our setting, the number of features for each sample is high. We posit and observe to be true that careful "feature selection" within unsupervised anomaly detection may be needed to achieve the most accurate results. Our approach effectively selects features (tests), even though there are no labeled anomalous examples available to form a basis for standard (supervised) feature selection. We form pairwise feature tests based on bivariate Gaussian mixture null models, with one test for every pair of features. The mixtures are estimated using known class samples (null "training set"). Then, we obtain p-values on the test batch samples under the null hypothesis. Subsequently, we calculate approximate joint p-values for candidate anomalous clusters, defined by (sample subset, test subset) pairs. Our approach sequentially detects the most significant clusters of samples in a networking context. We compare our "p-value clustering algorithm", using ROC curves, with alternative p-value based methods and with the one-class SVM. All the competing methods make sample-wise detections, i.e. they do not jointly detect anomalous clusters. The anomalous class was either an HTTP bot (Zeus) or peer-to-peer (P2P) traffic. Our p-value clustering approach gives promising results for detecting the Zeus bot and P2P traffic amongst Web.
引用
收藏
页数:6
相关论文
共 50 条
  • [1] Hierarchical Neural Networks for Detecting Anomalous Traffic Flows
    Ryu, Seung-Jin
    Go, Wooyoung
    Lee, Daewoo
    Yoon, Han-Jun
    2019 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM), 2019,
  • [2] Detecting Anomalous Network Traffic in IoT Networks
    Dang Hai Hoang
    Ha Duong Nguyen
    2019 21ST INTERNATIONAL CONFERENCE ON ADVANCED COMMUNICATION TECHNOLOGY (ICACT): ICT FOR 4TH INDUSTRIAL REVOLUTION, 2019, : 1143 - 1152
  • [3] Detecting Anomalous Network Traffic Using Evidence Theory
    Mattar, Ahmed
    Reformat, Marek Z.
    ADVANCES IN FUZZY LOGIC AND TECHNOLOGY 2017, VOL 2, 2018, 642 : 493 - 504
  • [4] Detecting Anomalous Network Traffic in Organizational Private Networks
    Vaarandi, Risto
    2013 IEEE INTERNATIONAL MULTI-DISCIPLINARY CONFERENCE ON COGNITIVE METHODS IN SITUATION AWARENESS AND DECISION SUPPORT (COGSIMA), 2013, : 285 - 292
  • [5] A Fast Algorithm for Detecting Anomalous Changes in Network Traffic
    Huang, Tingshan
    Sethu, Harish
    Kandasamy, Nagarajan
    2015 11TH INTERNATIONAL CONFERENCE ON NETWORK AND SERVICE MANAGEMENT (CNSM), 2015, : 251 - 255
  • [6] Detecting anomalous network traffic with self-organizing maps
    Ramadas, M
    Ostermann, S
    Tjaden, B
    RECENT ADVANCES IN INTRUSION DETECTION, PROCEEDINGS, 2003, 2820 : 36 - 54
  • [7] Using Wavelets for Compression and Detecting Events in Anomalous Network Traffic
    Kyriakopoulos, Konstantinos G.
    Parish, David J.
    2009 4TH INTERNATIONAL CONFERENCE ON SYSTEMS AND NETWORKS COMMUNICATIONS (ICSNC 2009), 2009, : 195 - 200
  • [8] A Contextual Approach for Improving Anomalous Network Traffic Flows Prediction
    Babai, Eilaf M. A.
    Okamura, Koji
    2024 IEEE 48TH ANNUAL COMPUTERS, SOFTWARE, AND APPLICATIONS CONFERENCE, COMPSAC 2024, 2024, : 2203 - 2208
  • [9] Detecting botnet by anomalous traffic
    Chen, Chia-Mei
    Lin, Hsiao-Chung
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2015, 21 : 42 - 51
  • [10] Detecting anomalous network traffic with combined fuzzy-based approaches
    He, HT
    Luo, XN
    Liu, BL
    ADVANCES IN INTELLIGENT COMPUTING, PT 2, PROCEEDINGS, 2005, 3645 : 433 - 442