Flow-based statistical aggregation schemes for network anomaly detection

被引:0
|
作者
Song, Sui [1 ]
Ling, Li [1 ]
Manikopoulo, C. N. [1 ]
机构
[1] New Jersey Inst Technol, Dept Elect Engn, Newark, NJ 07102 USA
关键词
flow; aggregation; neural network classifier; network intrusion detection system;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper, we present a novel Flow-based Statistical Aggregation Schemes (FSAS) for Network Anomaly Detection. An IP flow is a unidirectional series of IP packets of a given protocol, traveling between a source and destination, within a certain period of time. Based on "flow" concept, we developed a flow-based aggregation technique that dramatically reduces the amount of monitoring data and handles high amounts of statistics and packet data. FSSAS sets up flow-based statistical feature vectors and reports to Neural Network Classifier. Neural Classifier uses Back-Propagation networks to classify score metric of each flow. FSAS can detect both bandwidth type DOS and protocol type DOS. Moreover, flow here could be any set of packets sharing certain common property as "flow key". FSAS configures flow flexibly to provide security from network level to application level (IP, TCP, UDP, HTTP, FTP...), and different aggregation schemes, such as server -based, client-based flow. This novel IDS has been evaluated by using DARPA 98 data and CONEX test-bed data. Results show the success in terms of different aggregation schemes for both datasets.
引用
收藏
页码:786 / 791
页数:6
相关论文
共 50 条
  • [41] FlowTransformer: A transformer framework for flow-based network intrusion detection systems
    Manocchio, Liam Daly
    Layeghy, Siamak
    Lo, Wai Weng
    Kulatilleke, Gayan K.
    Sarhan, Mohanad
    Portmann, Marius
    EXPERT SYSTEMS WITH APPLICATIONS, 2024, 241
  • [42] Automated Flow-based Rule Generation for Network Intrusion Detection Systems
    Fallahi, Naser
    Sami, Ashkan
    Tajbakhsh, Morteza
    2016 24TH IRANIAN CONFERENCE ON ELECTRICAL ENGINEERING (ICEE), 2016, : 1948 - 1953
  • [43] Subtractive Aggregation for Attributed Network Anomaly Detection
    Zhou, Shuang
    Tan, Qiaoyu
    Xu, Zhiming
    Huang, Xiao
    Chung, Fu-lai
    PROCEEDINGS OF THE 30TH ACM INTERNATIONAL CONFERENCE ON INFORMATION & KNOWLEDGE MANAGEMENT, CIKM 2021, 2021, : 3672 - 3676
  • [44] Aggregation and Thresholding Schemes for Anomaly-Based Approaches
    Benferhat, Salem
    Tabia, Karim
    E-BUSINESS AND TELECOMMUNICATIONS, 2009, 48 : 140 - 152
  • [45] StatWire: Visual Flow-based Statistical Programming
    Subramanian, Krishna
    Maas, Johannes
    Ellers, Michael
    Wacharamanotham, Chat
    Voelker, Simon
    Borchers, Jan
    CHI 2018: EXTENDED ABSTRACTS OF THE 2018 CHI CONFERENCE ON HUMAN FACTORS IN COMPUTING SYSTEMS, 2018,
  • [46] Network Flow Anomaly Detection Based on Improved Echo State Network
    Chen, Mingzhong
    Qiu, Bin
    Ji, Jie
    WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2022, 2022
  • [47] A comparative study of anomaly detection schemes in network intrusion detection
    Lazarevic, A
    Ertoz, L
    Kumar, V
    Ozgur, A
    Srivastava, J
    PROCEEDINGS OF THE THIRD SIAM INTERNATIONAL CONFERENCE ON DATA MINING, 2003, : 25 - 36
  • [48] Flow-Based Network Creation Games
    Echzell, Hagen
    Friedrich, Tobias
    Lenzner, Pascal
    Melnichenko, Anna
    PROCEEDINGS OF THE TWENTY-NINTH INTERNATIONAL JOINT CONFERENCE ON ARTIFICIAL INTELLIGENCE, 2020, : 139 - 145
  • [49] PCA-based multivariate statistical network monitoring for anomaly detection
    Camacho, Jose
    Perez-Villegas, Alejandro
    Garcia-Teodoro, Pedro
    Macia-Fernandez, Gabriel
    COMPUTERS & SECURITY, 2016, 59 : 118 - 137
  • [50] Statistical and signal-based network traffic recognition for anomaly detection
    Choras, Michal
    Saganowski, Lukasz
    Renk, Rafal
    Holubowicz, Witold
    EXPERT SYSTEMS, 2012, 29 (03) : 232 - 245