Detecting Anomalous Latent Classes in a Batch of Network Traffic Flows

被引:0
|
作者
Kocak, Fatih [1 ]
Miller, David J.
Kesidis, George
机构
[1] Penn State Univ, EE Dept, University Pk, PA 16802 USA
来源
2014 48TH ANNUAL CONFERENCE ON INFORMATION SCIENCES AND SYSTEMS (CISS) | 2014年
关键词
anomaly detection; clustering; intrusion detection; mixture models; feature selection; p-value; one-class SVM;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
We focus on detecting samples from anomalous latent classes, "buried" within a collected batch of known ("normal") class samples. In our setting, the number of features for each sample is high. We posit and observe to be true that careful "feature selection" within unsupervised anomaly detection may be needed to achieve the most accurate results. Our approach effectively selects features (tests), even though there are no labeled anomalous examples available to form a basis for standard (supervised) feature selection. We form pairwise feature tests based on bivariate Gaussian mixture null models, with one test for every pair of features. The mixtures are estimated using known class samples (null "training set"). Then, we obtain p-values on the test batch samples under the null hypothesis. Subsequently, we calculate approximate joint p-values for candidate anomalous clusters, defined by (sample subset, test subset) pairs. Our approach sequentially detects the most significant clusters of samples in a networking context. We compare our "p-value clustering algorithm", using ROC curves, with alternative p-value based methods and with the one-class SVM. All the competing methods make sample-wise detections, i.e. they do not jointly detect anomalous clusters. The anomalous class was either an HTTP bot (Zeus) or peer-to-peer (P2P) traffic. Our p-value clustering approach gives promising results for detecting the Zeus bot and P2P traffic amongst Web.
引用
收藏
页数:6
相关论文
共 50 条
  • [21] Batch Discovery of Recurring Rare Classes toward Identifying Anomalous Samples
    Dundar, Murat
    Yerebakan, Halid Ziya
    Rajwa, Bartek
    PROCEEDINGS OF THE 20TH ACM SIGKDD INTERNATIONAL CONFERENCE ON KNOWLEDGE DISCOVERY AND DATA MINING (KDD'14), 2014, : 223 - 232
  • [22] Detecting an abnormal traffic on healthcare Network
    Lee, Wonhyuk
    Kim, Seunghae
    Jeon, Hongseok
    Kim, Hyuncheol
    2015 5TH INTERNATIONAL CONFERENCE ON IT CONVERGENCE AND SECURITY (ICITCS), 2015,
  • [23] Detecting Anomaly Traffic in Controlled Network
    Jin, Renjie
    Wang, Yu
    Han, Weijie
    2016 INTERNATIONAL CONFERENCE ON COMPUTER ENGINEERING, INFORMATION SCIENCE AND INTERNET TECHNOLOGY (CII 2016), 2016, : 140 - 147
  • [24] Analysis and optimality on network traffic flows
    School of Computer Science and Information Engineering, Chongqing Technology and Business University, Chongqing,400067, China
    不详
    WRI World Congr. Comput. Sci. Inf. Eng., CSIE, 2009, (39-43):
  • [25] Network optimization with stochastic traffic flows
    Liu, Xian
    International Journal of Network Management, 2002, 12 (04) : 225 - 234
  • [26] Predicting information flows in network traffic
    Hinich, MJ
    Molyneux, RE
    JOURNAL OF THE AMERICAN SOCIETY FOR INFORMATION SCIENCE AND TECHNOLOGY, 2003, 54 (02): : 161 - 168
  • [27] Linguistic Summarization of Network Traffic Flows
    Montesino Pouzols, Federico
    Barriga, Angel
    Lopez, Diego R.
    Sanchez-Solano, Santiago
    2008 IEEE INTERNATIONAL CONFERENCE ON FUZZY SYSTEMS, VOLS 1-5, 2008, : 619 - +
  • [28] Detecting Latent Communities in Network Formation Models
    Ma, Shujie
    Su, Liangjun
    Zhang, Yichong
    JOURNAL OF MACHINE LEARNING RESEARCH, 2022, 23
  • [29] Detecting Latent Communities in Network Formation Models
    Ma, Shujie
    Su, Liangjun
    Zhang, Yichong
    Journal of Machine Learning Research, 2022, 23
  • [30] AnFlo: Detecting Anomalous Sensitive Information Flows in Android Apps
    Demissie, Biniam Fisseha
    Ceccato, Mariano
    Shar, Lwin Khin
    2018 IEEE/ACM 5TH INTERNATIONAL CONFERENCE ON MOBILE SOFTWARE ENGINEERING AND SYSTEMS (MOBILESOFT), 2018, : 24 - 34