Detecting Anomalous Latent Classes in a Batch of Network Traffic Flows

被引:0
|
作者
Kocak, Fatih [1 ]
Miller, David J.
Kesidis, George
机构
[1] Penn State Univ, EE Dept, University Pk, PA 16802 USA
来源
2014 48TH ANNUAL CONFERENCE ON INFORMATION SCIENCES AND SYSTEMS (CISS) | 2014年
关键词
anomaly detection; clustering; intrusion detection; mixture models; feature selection; p-value; one-class SVM;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
We focus on detecting samples from anomalous latent classes, "buried" within a collected batch of known ("normal") class samples. In our setting, the number of features for each sample is high. We posit and observe to be true that careful "feature selection" within unsupervised anomaly detection may be needed to achieve the most accurate results. Our approach effectively selects features (tests), even though there are no labeled anomalous examples available to form a basis for standard (supervised) feature selection. We form pairwise feature tests based on bivariate Gaussian mixture null models, with one test for every pair of features. The mixtures are estimated using known class samples (null "training set"). Then, we obtain p-values on the test batch samples under the null hypothesis. Subsequently, we calculate approximate joint p-values for candidate anomalous clusters, defined by (sample subset, test subset) pairs. Our approach sequentially detects the most significant clusters of samples in a networking context. We compare our "p-value clustering algorithm", using ROC curves, with alternative p-value based methods and with the one-class SVM. All the competing methods make sample-wise detections, i.e. they do not jointly detect anomalous clusters. The anomalous class was either an HTTP bot (Zeus) or peer-to-peer (P2P) traffic. Our p-value clustering approach gives promising results for detecting the Zeus bot and P2P traffic amongst Web.
引用
收藏
页数:6
相关论文
共 50 条
  • [31] Detecting Localised Anomalous Behaviour in a Computer Network
    Turcotte, Melissa
    Heard, Nicholas
    Neil, Joshua
    ADVANCES IN INTELLIGENT DATA ANALYSIS XIII, 2014, 8819 : 321 - 332
  • [32] Detecting anomalous network hosts by means of PCA
    Pevny, Tomas
    Rehak, Martin
    Grill, Martin
    2012 IEEE INTERNATIONAL WORKSHOP ON INFORMATION FORENSICS AND SECURITY (WIFS), 2012, : 103 - 108
  • [33] Detecting latent attack behavior from aggregated Web traffic
    Xie, Y.
    Tang, S.
    Huang, X.
    Tang, C.
    Liu, X.
    COMPUTER COMMUNICATIONS, 2013, 36 (08) : 895 - 907
  • [34] Detecting Anomalous IoT Traffic Flow with Locality Sensitive Hashes
    Charyyev, Batyr
    Gunes, Mehmet Hadi
    2020 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM), 2020,
  • [35] Baseline Traffic Modeling for Anomalous Traffic Detection on Network Transit Points
    Cho, Yoohee
    Kang, Koohong
    Kim, Ikkyun
    Jeong, Kitae
    MANAGEMENT ENABLING THE FUTURE INTERNET FOR CHANGING BUSINESS AND NEW COMPUTING SERVICES, PROCEEDINGS, 2009, 5787 : 385 - +
  • [36] The effectively method of detecting network traffic anomaly
    Cheng Juan
    Qian Jin
    Qian Ke
    ADVANCES IN APPLIED SCIENCE AND INDUSTRIAL TECHNOLOGY, PTS 1 AND 2, 2013, 798-799 : 411 - 414
  • [37] Detecting HTTP Botnet with Clustering Network Traffic
    Cai, Tao
    Zou, Futai
    2012 INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING (WICOM), 2012,
  • [38] Traffic Congestion Detecting Based on Cellular Network
    Guo, Zhe
    Huang, Benxiong
    Wang, Furong
    Tu, Lai
    JOURNAL OF INTERNET TECHNOLOGY, 2013, 14 (07): : 1053 - 1060
  • [39] A Method of Detecting Network Anomalies in Cyclic Traffic
    Harada, Shigeaki
    Kawahara, Ryoichi
    Mori, Tatsuya
    Kamiyama, Noriaki
    Hasegawa, Haruhisa
    Yoshino, Hideaki
    GLOBECOM 2008 - 2008 IEEE GLOBAL TELECOMMUNICATIONS CONFERENCE, 2008,
  • [40] FlowCop: Detecting "Stranger" in Network Traffic Classification
    Fu, Ningjia
    Xu, Yuwei
    Zhang, Jianzhong
    Wang, Rongkang
    Xu, Jingdong
    2018 27TH INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATION AND NETWORKS (ICCCN), 2018,