Detecting Anomalous Latent Classes in a Batch of Network Traffic Flows

被引:0
|
作者
Kocak, Fatih [1 ]
Miller, David J.
Kesidis, George
机构
[1] Penn State Univ, EE Dept, University Pk, PA 16802 USA
来源
2014 48TH ANNUAL CONFERENCE ON INFORMATION SCIENCES AND SYSTEMS (CISS) | 2014年
关键词
anomaly detection; clustering; intrusion detection; mixture models; feature selection; p-value; one-class SVM;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
We focus on detecting samples from anomalous latent classes, "buried" within a collected batch of known ("normal") class samples. In our setting, the number of features for each sample is high. We posit and observe to be true that careful "feature selection" within unsupervised anomaly detection may be needed to achieve the most accurate results. Our approach effectively selects features (tests), even though there are no labeled anomalous examples available to form a basis for standard (supervised) feature selection. We form pairwise feature tests based on bivariate Gaussian mixture null models, with one test for every pair of features. The mixtures are estimated using known class samples (null "training set"). Then, we obtain p-values on the test batch samples under the null hypothesis. Subsequently, we calculate approximate joint p-values for candidate anomalous clusters, defined by (sample subset, test subset) pairs. Our approach sequentially detects the most significant clusters of samples in a networking context. We compare our "p-value clustering algorithm", using ROC curves, with alternative p-value based methods and with the one-class SVM. All the competing methods make sample-wise detections, i.e. they do not jointly detect anomalous clusters. The anomalous class was either an HTTP bot (Zeus) or peer-to-peer (P2P) traffic. Our p-value clustering approach gives promising results for detecting the Zeus bot and P2P traffic amongst Web.
引用
收藏
页数:6
相关论文
共 50 条
  • [41] A Survey of Network Traffic Visualization in Detecting Network Security Threats
    Liu, Xiaomei
    Sun, Yong
    Fang, Liang
    Liu, Junpeng
    Yu, Lingjing
    TRUSTWORTHY COMPUTING AND SERVICES (ISCTCS 2014), 2015, 520 : 91 - 98
  • [42] A Markovian Approach with Batch Processes for Multifractal Network Traffic
    Jusak, Jusak
    Harris, Richard J.
    TENCON 2010: 2010 IEEE REGION 10 CONFERENCE, 2010, : 763 - 768
  • [43] Network Interdiction Using Adversarial Traffic Flows
    Fu, Xinzhe
    Modiano, Eytan
    IEEE CONFERENCE ON COMPUTER COMMUNICATIONS (IEEE INFOCOM 2019), 2019, : 1765 - 1773
  • [44] Cluster analysis of traffic flows on a campus network
    Karim, A
    Ahmad, I
    Jami, SI
    Sarwar, M
    PROCEEDINGS OF THE IASTED INTERNATIONAL CONFERENCE ON ARTIFICIAL INTELLIGENCE AND APPLICATIONS, 2006, : 416 - +
  • [45] Tracking Long Duration Flows in Network Traffic
    Chen, Aiyou
    Jin, Yu
    Cao, Jin
    Li, Li Erran
    2010 PROCEEDINGS IEEE INFOCOM, 2010,
  • [46] Network Utility Maximization with Heterogeneous Traffic Flows
    Sinha, Abhishek
    Modiano, Eytan
    2018 16TH INTERNATIONAL SYMPOSIUM ON MODELING AND OPTIMIZATION IN MOBILE, AD HOC, AND WIRELESS NETWORKS (WIOPT), 2018,
  • [47] Batch Poissonian Arrival Models of Multiservice Network Traffic
    Lichtzinder, B. Ya.
    Privalov, A. Yu.
    Moiseev, V. I.
    PROBLEMS OF INFORMATION TRANSMISSION, 2023, 59 (01) : 63 - 70
  • [48] Batch Poissonian Arrival Models of Multiservice Network Traffic
    B. Ya. Lichtzinder
    A. Yu. Privalov
    V. I. Moiseev
    Problems of Information Transmission, 2023, 59 : 63 - 70
  • [49] An Adaptive Profile-Based Approach for Detecting Anomalous Traffic in Backbone
    Zang, Xiao-Dong
    Gong, Jian
    Hu, Xiao-Yan
    IEEE ACCESS, 2019, 7 : 56920 - 56934
  • [50] Detecting Network Intrusion through Anomalous Packet Identification
    Dipon, Tanjim Munir
    Hossain, Shohrab
    Narman, Husnu S.
    2020 30TH INTERNATIONAL TELECOMMUNICATION NETWORKS AND APPLICATIONS CONFERENCE (ITNAC), 2020, : 177 - 182