Packet Header Anomaly Detection Using Bayesian Topic Models
|
|
|
- Arabella Preston
- 10 years ago
- Views:
Transcription
1 Packet Header Anomaly Detection Using Bayesian Topic Models Xuefei Cao, Bo Chen, Hui Li, Yulong Fu January 18, 2016 Abstract A method of network intrusion detection is proposed based on Bayesian topic models. The method employs tcpdump packets and extracts multiple features from the packet headers. A topic model is trained using the normal traffic in order to learn feature patterns of the normal traffic. Then the test traffic is analyzed against the learned normal feature patterns to measure the extent to which the test traffic resembles the learned feature patterns. Since the feature patterns are learned using only the normal traffic, the test traffic is likely to be normal if its feature pattern resembles the learned feature patterns. An attack alarm is raised when the test traffic s resemblance to the learned feature patterns is lower than a threshold. Experiment shows that our method is efficient in attack detection. It answers the open question how to detect network intrusions using topic models. 1 Introduction Network intrusion detection has been an important issue nowadays since our daily work depends heavily on networks. Network intrusions fall into four categories including Denial of Service, Remote to Local, User to Root, and Probe. There are two methods to detect intrusions in general, i.e., signature-based methods and anomaly-based methods. The signature-based method predefines the patterns of intrusions and matches the network traffic against the patterns to raise detection alarms. While this method has low false alarm rate, it gives less than satisfactory results in detecting new types of attacks beyond the predefined patterns. Anomaly-based method establishes the normal usage patterns for network traffic and any behavior deviating from the normal patterns is deemed anomalous. Compared with signature-based method, anomaly-based method has the advantage of detecting zero-day exposure attacks, and witnesses a fast development. LDA (Latent Dirichlet Allocation) [1] is a Bayesian topic model for text categorization. It is used to extract the representations of a collection of documents. Since LDA is capable of generalizing the structure representations, and network intrusions should be different in structure from normal traffic, LDA Xuefei Cao is with Xidian University, [email protected] 1
2 model could be used to learn the structures of normal network traffic and to detect the network intrusions. In this paper, we study the problem of LDA-based network intrusion detection. We employ a comprehensive set of network features, and come up with a new way of applying LDA model to network traffic. We also testify our method on widely tested network traffic data, and the experiment shows the effectiveness of our method. The remaining of this paper is arranged as follows. Section 2 discusses the related work and our work s relationship with existing work. Section 3 introduces the Latent Dirichlet Allocation. Our scheme is proposed in Section 4. Section 5 gives the performance study while Section 6 concludes the paper. 2 Related Works There have been continuous efforts to apply LDA model to the analysis of network traffic and cyber data. Cramer et al. [2] study the patterns of the network traffic in a corporation environment using LDA. It discovers the pattern differences in network usage between daytime and nighttime. [4] proposes several constructions of anomaly detectors in LDA s framework, and notices several abnormalities in a laboratory network. [16] applies LDA to model network traffic profiles, and shows the pattern differences when the profiles are represented by LDA topics. These papers succeed in detecting the anomalies using LDA, but there is still gap between bringing up pattern anomalies and detecting intrusions because anomalies do not necessarily relate to attacks. Also, there lacks the report of these the methods application to intrusion detections. The current results are just initial explorations in the line, it is still an open question that how to use LDA to detect network intrusions [2]. According to the type of network traffic, network intrusion detection systems could be divided into three categories. One type of traffic data in use is system calls. Forrest et al. [5] first use traces of system calls for anomaly detection in UNIX process. For a given host, they train an n-gram model (n = 3 to 6) over the normal system calls, and look for trace differences in the test data. Liao et al. [9] improve the method by introducing text categorization techniques. They describe normal program behavior by counting the frequency of system calls using k-nearest Neighbor classifiers. Then text categorization technique is adopted to convert each process into a vector and the similarity is calculated between processes. The k neighbors with the nearest similarity are chosen to determine whether the process is normal or not. Another form of audit data is TCP/IP connection descriptions which include the summarization of high level interactions between hosts such as session duration, type of service, number of failed login attempts, status of guest log-in and so on. Many systems first reconstruct raw network data into connections and extract connection features before carrying out detection techniques. MADAMID [7], Bro [14], EMERALD [15] are systems of this kind. Stolfo et al. produced a standard TCP/IP connection dataset in 1999 [19]. Various machine learning techniques have been applied to the dataset and shown their effectiveness, for example, Naive Bayesian[24, 25], nearest neigbor[8, 6, 3], neural networks[20, 10], fuzzy-logic[22] and so on. The third intrusion detection system works at packets level. Since attacks 2
3 exploit software bugs, for it to succeed, certain packet feature fields usually use less testified feature values. The most common paradigm based on TCP/IP packets is the firewall model, which blocks traffic to certain hosts or ports. Recent researches use more compact set of packet feature fields to gain improved detection rate. Wang and Stolfo [23] use packet payload. PHAD [12] models 33 packet features, and detects attacks based on the sum of abnormal score over the features. NETAD [11] filters out the most significant packets such as the beginning and ending packets of a connection, and models the protocol behavior using attributes from the first 48 bytes of the packets. Shon et al. [18] apply genetic algorithm to tcpdump packets. [17] uses the same set of features as PHAD [12], and models network behaviors according to protocols used by the traffic. 3 Topic Models Latent Dirichlet Allocation is a statistical text model which assumes that a small number of distribution over words, called topics, generate the observed documents. Each document exhibits the topics set with different proportion [13]. Formally, the vocabulary is a vector V, the d-th document w (d) is an unordered word count defined over V of length V. The corpus is W = {w (1), w (2),, w (D) }. θ d is the topic distribution for the d-th document, and it follows a Dirichlet distribution with prior parameter α with dimension K. A set of K topics Φ = {φ 1, φ 2,, φ K } are used, φ i denotes the word distribution for the i-th topic and the length is V. Each word of a document, wn d has a topic label zn d {1,, K} which is drawn from θ d multinomially. The generative process of LDA is shown graphically in Fig. 1. β ϕ α θ z w N D Figure 1: Generative process of LDA model In the figure, α and β are hyperparameters for θ and Φ, respectively. The distributions of variables are as follows: θ d Dir(α) z d n Multinomial(θ d) φ k Dir(β) w d n Multinomial(φ z d n ) 3
4 w is an observable variable, θ and Φ are latent variables to be inferred. Two effective methods to do the inference are variational Bayes and Gibbs Sampling. Throughout this paper, we use Gibbs Sampling because Gibbs Sampling is a typical method for the inference of hierarchical Dirichlet structures and is able to calculate the exact conditional posterior. Variational Bayes might be faster but the performance is slightly worse than Gibbs. Given the observed data W, Gibbs sampling resamples Z according to its conditional posterior and then estimates θ and Φ by examining the distribution of Z. The detailed parameter inference is listed as below. p(z d n = j ) θ dj φ jw d n p(θ d ) Γ(Σ α p(φ k ) Γ(Σ β i=1 αi) K α i=1 Γ(αi) i=1 θn(d,i)+αi 1 di i=1 βi) V β φn(,k,i)+βi 1 i=1 Γ(βi) i=1 ki, where n(d, i) is the number of words in document d assigned to topic i, n(, k, i) is the number of word k assigned to topic i in the corpus, and Γ(n) = (n 1)!. 4 Packet header anomaly detection using LDA To apply LDA to network traffic data, the first step is to transfer the network traffic, either in the form of tcpdump packets or TCP/IP connections, into documents which are expressed by words. In LDA, a document is treated with the notion of bag-of-words, i.e., the order of word tokens is neglected, and a document is expressed using a predefined vocabulary and the times each word in the vocabulary appearing in the document. Tcpdump traffic enables us to draw an analogy between network traffic and documents easily. The tcpdump traffic within a time slot, say five minutes, can be viewed as a document, and the document can be converted into words by means of the packets network features. To be more specific, tcpdump traffic is composed of packets which contains many feature fields, such as the IP address, MAC address, packet length and so on. The features are repeatable across the session. Then the repetition of features in a session resembles the repetition of words in a document. Therefore, the vocabulary is defined as all possible network features appearing in the traffic. Each packet is defined by a set of N distinct features, and then converted to a set of N words. Table 1 is an analogy between text categorization and network traffic when applying LDA. In our scheme, we extract N = 16 features from a packet. These features are proved to be effective in the detection of intrusions [12]. Table 2 lists all the features used. Another question is how to detect attacks using LDA given the traffic transformed. Our method is to use LDA to generalize the structure of normal traffic, and to employ the document likelihood as a detector. Attack-free traffic is used to train the LDA model, thus the resulted topic-word distribution Φ in fact describes the structure for normal traffic. Likelihood is employed to define the extent to which a test document deviates from the normal structure. If a test documents s likelihood is lower than the threshold, the document is regarded as abnormal. Since different hosts may have different behavior structures, our 4
5 Term Text Categorization Network Traffic D total number of documents total number of five-minute tcpdump sessions w (d) the d-th document the d-th five-minute tcpdum session V the collection of unique words the collection of unique features in in corpus traffic wn d the n-th word in the d-th the n-th feature in the d-th session document (extracted from the n N -th packet in the session) n(i, j) the number of i-th word assigned the number of i-th feature assigned to the j-th topic to the j-th topic Table 1: Analogy between text categorization and network traffic Packet Layer Ethernet Layer IP Layer Transport/ Control Layer Others Features Extracted higher 3 bytes of MAC source, higher 3 bytes of MAC destination total length, type of service, fragment flags, time to live, IP source, IP destination TCP flag, TCP checksum, TCP URG pointer, TCP option UDP checksum, service port, ICMP checksum packet size Table 2: Feature List scheme is host-based. Each host has its own threshold, which is the minimum of likelihood of the training documents. The vocabulary list is also host-based and should contain all possible feature values seen by the host, thus we collect the features appearing in the host s training data. However, the training data is attack-free, but attacks usually employ features that seldom used by normal traffic, thus we assign an extra value for each feature field so as to deal with the features that doesn t appear in the training data. The features which don t appear in the training data but appear in the test data will be assigned to this extra value of the field. Let F i i {1, 2,, 16} be the number of anomalies collected in the training data s i-th field, then the length of the vocabulary is V = F 1 + F F Based on the above ideas, our method comprises three steps. First, vocabulary list of a host is built based on the host s attack-free tcpdump packets data during a long enough time. Each packets is denoted by 16 features, and the anomalies of each feature field are collected. The vocabulary is the collection of all the anomalies in the 16 feature fields plus 1 extra word for each feature filed. Then, both training traffic and test traffic are separated into five minute sessions and then each session is turned into a document by counting how many times each feature appearing in the session. Finally, LDA model is trained using the training documents. Likelihood of each training document is computed using Φ and θ d according to Eq.1. The minimal likelihood of training documents is used as the threshold. In the test phase, we compute the likelihood of each test document, and the document whose likelihood is lower than the threshold is 5
6 labeled as attack. lik d = Nd n=1 Σ K j=1p(w d n z d n = j, φ j ) p(z d n = j θ d ) = 5 Experimental Results Nd n=1 Σ K j=1φ jw d n θ dj (1) The network traffic used in this session is the MIT Lincoln Laboratory DARPA dataset which is the most popular experimental dataset for network intrusion detection systems [21]. Most NIDS would test their efficiency against the dataset, and thus the effectiveness of NIDS could be compared over the same baseline. The DARPA99 dataset provides the simulated tcpdump data of a military base. The audit logs contain three weeks of training data and two weeks of test data. The first week and the third week training data are attack-free while the two weeks of test data contain 201 attack instances of 55 types covering all the four attack categories. In the training phase, we use the third week s 7 days tcpdump traffic (Mar 15 - Mar 19 with two extra days) which are are collected in the internal network (inside.tcpdump). Two weeks of test data (Mar 29 - Apr 2 and Apr 5 - Apr 9) are used to test the efficiency of our method. Since our model is host-based, we first process the training and test traffic by selecting packets to and from a single host and put them together. There are 15 hosts of concern in the training and test dataset, thus these datasets are separated into 15 sub-datasets respectively. Figure 2 illustrates the separation of training data, each column in the figure is a sub-dataset. Figure 2: Example of Data Separation for Training Traffic The vocabulary list is first generated based on the attack-free training data. For each host, the range of feature anomalies is determined by first extracting 16 features from every packet and then filtering the unique values for each field. Then a vocabulary list is generated for each host by adding one extra word for each feature field according to the description in Section 4. Then the traffic can be converted into documents. For each host, the traffic is divided into 300s sessions, i.e, the arriving time of the last packet is at most 300 seconds later than the first packet. Then we count the times each feature value appears in a session, and turn the session into a document. Take the host Pascal ( ) as an example. Figure 3 shows the features collected in the 6
7 training traffic of Pascal. Suppose a session containing 200 packets whose feature distribution is as shown in Figure 4, the resulted document is a vector with the {1, 1322, 1323, 1324, 1329, 1330, 1337, 2665, 2667, 2672, 2681, 2685, 2687, 2716, 2718, 2747, 2757, 2760, 2763, 2766, 2770, 2771, 2772} digits setting as {199, 1, 100, 100, 100, 100, 199, 1, 200, 200, 200, 100, 100, 100, 100, 200, 200, 200, 200, 200, 199, 1, 200}, respectively. Note that this session should come from a test session because it contains EtherSize others, IPLength others, and ICMPChecksum others values. Field name Anomaly # Values Ether Size Ether Src Hi 5 x0000c0 x00105a x00107b Ether Dest Hi 6 x0000c0 x00105a x00107b IP Length 1329 NULL IP TOS 4 NULL x00 x08 x10 IP Fragment 3 NULL x0000 x4000 IP TTL 7 NULL IP Src IP Dst TCP Flag 9 NULL x02 x04 x10 TCP Checksum 2 NULL xffff TCP URG 2 NULL 0 TCP Option 2 NULL x020405b4 UDP Checksum 2 NULL xffff ICMP Checksum 2 NULL xffff Service Port 16 NULL Figure 3: Feature anomalies of Pascal An LDA model is trained for each host. The reason is that different host may be dedicated to different purposes such as mail server, Internet proxy, thus the topic distributions could be totally different among hosts. By using a single LDA model for each host, the detection accuracy could be greatly improved. The number of topics used by LDA is determined according to the size of vocabulary list. We use T = 150 for most of hosts whose vocabulary size is around 2000 and T = 10 for two hosts with vocabulary size around 100. For all the hosts, β = 0.01 and α = 10/T. LDA model is trained using the training documents. 7
8 Field name Feature Value Count Number Ether Size Ether Src Hi x0000c0 100 x00105a 100 Ether Dest Hi x0000c0 100 x00105a 100 IP Length IP TOS x IP Fragment x IP TTL IP Src IP Dst TCP Flag NULL 200 TCP Checksum NULL 200 TCP URG NULL 200 TCP Option NULL 200 UDP Checksum NULL 200 ICMP Checksum 0xffff 199 0xabcd 1 Service Port NULL 200 Figure 4: Example of session feature distributions There are at most 1716 documents and at least 829 documents used in training for different hosts. Attacks are detected during the test phase using likelihood according to Equation 1 where Φ is learned in the training phase and θ d in the test document. For each host, the lowest likelihood of its training documents is used as threshold. The test document whose likelihood is lower than the threshold is labeled as an attack. Given documents for all the 15 hosts, our method raises 1041 documents as abnormal, of which 730 are true positives and 490 are false positives. Since one instance of attack may contain several documents, there are 94 attacks detected in all. Each host has an average of 3.27 false positive documents per day. Table 3 lists the detection result using our method. We also compare the efficiency of our method against that of 8
9 PHAD[12]. The Column 1 is the number of instances detected by our method, Column 2 is by PHAD while Column 3 lists all the attack instances contained in the test dataset. Attack Det 1 Det 2 # Attack Det 1 Det 2 # anypw netcat apache ntfsdos arppoison ntinfoscan back perl casesen phf crashiis pod dict portsweep dosnuke ppmarcro eject processtable fdformat ps ffbconfig queso ftpwrite satan guessftp sechole guesspop selfping guesstelnet sendmail httptunnel smurf imap snmpget illegalsniffer tcpreset ipsweep teardrop mailbomb udpstorm mscan warez named xlock ncftp xsnoop neptune xterm netbus yaga Total Total Table 3: Attacks detected As can be seen from the table, our detection system outperforms PHAD in the detection of many types of attacks. This is because that in our method the behavior rule for the normal traffic, i.e. the topic-word distribution Φ, is generalized automatically by LDA which makes full use of all features and treats every feature as an independent variable. A topic is a representation of all the normal features with different probability. A document, or a session of traffic, should be a combination of normal topics. The likelihood is a measurement of the extent to which a document resembles the normal behavior rule. The lower the likelihood, the more likely the document contains an attack. By the contrast, PHAD built the model by adding up all anomaly values of each feature field, and used the sum to separate attacks from normal traffic. This method depends on a single variable which is too strong and lost the information presented by normal features. Thus our method can detect many types of attacks which is not detected by PHAD. Our method detects fewer probe attacks including portsweep, queso and ipsweep than PHAD does. This is due to the inborn insufficiency of host-based solutions and could be improved by increasing the 9
10 weight of certain features such as port number and TCP flag, and this will be our next step work. 6 Conclusion In this paper, we propose an LDA-based network intrusion detection scheme. Our scheme collects the features used by normal traffic and uses LDA to build the behavior rules that normal traffic should follow. Likelihood is employed as a detector to detect the attacks in test phase. The comparison between our scheme and existing scheme proves the possibility and efficiency of our solution. This work answers the question of how to detect network intrusions using LDA model. Our future work is to further increase the detection rate by improving the model and to consider the payload data in order to better utilize the advantage of the language models. References [1] D. M. Blei, A. Y. Ng, and M. I. Jordan. Latent Dirichlet allocation. Journal of Machine Learning Research, 3: , [2] C. Cramer and L. Carin. Bayesian topic models for describing computer network behaviors. In Acoustics, Speech and Signal Processing (ICASSP), 2011 IEEE International Conference on, pages , may [3] Levent Ertoz, Michael Steinbach, and Vipin Kumar. Finding clusters of different sizes, shapes, and densities in noisy, high dimensional data. In Daniel Barbara and Chandrika Kamath, editors, Proceedings of the Third SIAM International Conference on Data Mining (SDM 2003), volume 112 of Proceedings in Applied Mathematics. Society for Industrial and Applied Mathematics, [4] E.M. Ferragut, D.M. Darmon, C.A. Shue, and S. Kelley. Automatic construction of anomaly detectors from graphical models. In Computational Intelligence in Cyber Security (CICS), 2011 IEEE Symposium on, pages 9 16, april [5] Stephanie Forrest, Steven A. Hofmeyr, Anil Somayaji, and Thomas A. Longstaff. A sense of self for unix processes. In In Proceedings of the 1996 IEEE Symposium on Security and Privacy, pages IEEE Computer Society Press, [6] ShengYi Jiang, Xiaoyu Song, Hui Wang, Jian-Jun Han, and Qing-Hua Li. A clustering-based method for unsupervised intrusion detections. Pattern Recognition Letters, 27(7): , [7] Wenke Lee and Salvatore J. Stolfo. A framework for constructing features and models for intrusion detection systems. ACM Transactions on Information and System Security, 3: , [8] Yang Li, Binxing Fang, Li Guo, and You Chen. Network anomaly detection based on tcm-knn algorithm. In Proceedings of the 2nd ACM symposium on 10
11 Information, computer and communications security, ASIACCS 07, pages 13 19, New York, NY, USA, ACM. [9] Yihua Liao and V. Rao Vemuri. Using text categorization techniques for intrusion detection. In Proceedings of the 11th USENIX Security Symposium, pages 51 59, Berkeley, CA, USA, USENIX Association. [10] Guisong Liu, Zhang Yi, and Shangming Yang. A hierarchical intrusion detection model based on the pca neural networks. Neurocomputing, 70(79): , [11] Matthew V. Mahoney. Network traffic anomaly detection based on packet bytes. In Proceedings of the 2003 ACM symposium on Applied computing, SAC 03, pages , New York, NY, USA, ACM. [12] Matthew V. Mahoney and Philip K. Chan. Learning nonstationary models of normal network traffic for detecting novel attacks. In Proceedings of the eighth ACM SIGKDD international conference on Knowledge discovery and data mining, KDD 02, pages , New York, NY, USA, ACM. [13] David Mimno and David Blei. Bayesian checking for topic models. In Proceedings of the Conference on Empirical Methods in Natural Language Processing, EMNLP 11, pages , Stroudsburg, PA, USA, Association for Computational Linguistics. [14] Vern Paxson. Bro: A system for detecting network intruders in real-time. In Computer Networks, pages , [15] Phillip A. Porras and Peter G. Neumann. Emerald: Event monitoring enabling responses to anomalous live disturbances. In In Proceedings of the 20th National Information Systems Security Conference, pages , [16] David Gerald Robinson. Statistical language analysis for automatic exfiltration event detection. In Sandia National Laboratories Report, april [17] Solahuddin B. Shamsuddin and Michael E. Woodward. Modeling protocol based packet header anomaly detector for network and host intrusion detection systems. In Proceedings of the 6th international conference on Cryptology and network security, CANS 07, pages , Berlin, Heidelberg, Springer-Verlag. [18] Taeshik Shon, Xeno Kovah, and Jongsub Moon. Applying genetic algorithm for classifying anomalous tcp/ip packets. Neurocomputing, 69(1618): , [19] Salvatore J. Stolfo, Wei Fan, Wenke Lee, Andreas Prodromidis, and Philip K. Chan. Cost-based modeling for fraud and intrusion detection: Results from the jam project. In In Proceedings of the 2000 DARPA Information Survivability Conference and Exposition, pages IEEE Computer Press. 11
12 [20] Adel Nadjaran Toosi and Mohsen Kahani. A new approach to intrusion detection based on an evolutionary soft computing model using neuro-fuzzy classifiers. Comput. Commun., 30(10): , July [21] Chih-Fong Tsai, Yu-Feng Hsu, Chia-Ying Lin, and Wei-Yang Lin. Intrusion detection by machine learning: A review. Expert Systems with Applications, 36(10): , [22] Chi-Ho Tsang, Sam Kwong, and Hanli Wang. Genetic-fuzzy rule mining approach and evaluation of feature selection techniques for anomaly intrusion detection. Pattern Recogn., 40(9): , September [23] Ke Wang and Salvatore J. Stolfo. Anomalous payload-based network intrusion detection. pages , [24] Yun Wang. A multinomial logistic regression modeling approach for anomaly intrusion detection. Computers & Security, 24(8): , November [25] Yun Wang, Inyoung Kim, Gaston Mbateng, and Shih-Yieh Ho. A latent class modeling approach to detect network intrusion. Computer Communications, 30(1):93 100,
Network Traffic Anomaly Detection Based on Packet Bytes
Network Traffic Anomaly Detection Based on Packet Bytes Matthew V. Mahoney Florida Institute of Technology, Melbourne, Florida [email protected] ABSTRACT Hostile network traffic is often "different"
ANALYSIS OF PAYLOAD BASED APPLICATION LEVEL NETWORK ANOMALY DETECTION
ANALYSIS OF PAYLOAD BASED APPLICATION LEVEL NETWORK ANOMALY DETECTION Like Zhang, Gregory B. White Department of Computer Science, University of Texas at San Antonio [email protected], [email protected]
Usefulness of DARPA Dataset for Intrusion Detection System Evaluation
Usefulness of DARPA Dataset for Intrusion Detection System Evaluation Ciza Thomas Vishwas Sharma N. Balakrishnan Indian Institute of Science, Bangalore, India ABSTRACT The MIT Lincoln Laboratory IDS evaluation
PHAD: Packet Header Anomaly Detection for Identifying Hostile Network Traffic
PHAD: Packet Header Anomaly Detection for Identifying Hostile Network Traffic Matthew V. Mahoney and Philip K. Chan Department of Computer Sciences Florida Institute of Technology Melbourne, FL 32901 {mmahoney,pkc}@cs.fit.edu
An Analysis of the 1999 DARPA/Lincoln Laboratory Evaluation Data for Network Anomaly Detection TR CS-2003-02
An Analysis of the 1999 DARPA/Lincoln Laboratory Evaluation Data for Network Anomaly Detection TR CS-2003-02 Matthew V. Mahoney and Philip K. Chan Computer Science Department, Florida Institute of Technology
Efficient Security Alert Management System
Efficient Security Alert Management System Minoo Deljavan Anvary IT Department School of e-learning Shiraz University Shiraz, Fars, Iran Majid Ghonji Feshki Department of Computer Science Qzvin Branch,
Detecting Novel Network Intrusions Using Bayes Estimators
Detecting Novel Network Intrusions Using Bayes Estimators Daniel Barbará, Ningning Wu, and Sushil Jajodia 1 Introduction From the first appearance of network attacks, the internet worm, to the most recent
Neural networks vs. decision trees for intrusion detection
Neural networks vs. decision trees for intrusion detection Yacine Bouzida Mitsubishi Electric ITE-TCL 1, allée de Beaulieu CS 186 3578, Rennes, France [email protected] Frédéric Cuppens Département
STUDY OF IMPLEMENTATION OF INTRUSION DETECTION SYSTEM (IDS) VIA DIFFERENT APPROACHS
STUDY OF IMPLEMENTATION OF INTRUSION DETECTION SYSTEM (IDS) VIA DIFFERENT APPROACHS SACHIN MALVIYA Student, Department of Information Technology, Medicaps Institute of Science & Technology, INDORE (M.P.)
A SYSTEM FOR DENIAL OF SERVICE ATTACK DETECTION BASED ON MULTIVARIATE CORRELATION ANALYSIS
Journal homepage: www.mjret.in ISSN:2348-6953 A SYSTEM FOR DENIAL OF SERVICE ATTACK DETECTION BASED ON MULTIVARIATE CORRELATION ANALYSIS P.V.Sawant 1, M.P.Sable 2, P.V.Kore 3, S.R.Bhosale 4 Department
Euclidean-based Feature Selection for Network Intrusion Detection
2009 International Conference on Machine Learning and Computing IPCSIT vol3 (2011) (2011) IACSIT Press, Singapore Euclidean-based Feature Selection for Network Intrusion Detection Anirut Suebsing, Nualsawat
HYBRID INTRUSION DETECTION FOR CLUSTER BASED WIRELESS SENSOR NETWORK
HYBRID INTRUSION DETECTION FOR CLUSTER BASED WIRELESS SENSOR NETWORK 1 K.RANJITH SINGH 1 Dept. of Computer Science, Periyar University, TamilNadu, India 2 T.HEMA 2 Dept. of Computer Science, Periyar University,
Data Mining Yelp Data - Predicting rating stars from review text
Data Mining Yelp Data - Predicting rating stars from review text Rakesh Chada Stony Brook University [email protected] Chetan Naik Stony Brook University [email protected] ABSTRACT The majority
A Review of Anomaly Detection Techniques in Network Intrusion Detection System
A Review of Anomaly Detection Techniques in Network Intrusion Detection System Dr.D.V.S.S.Subrahmanyam Professor, Dept. of CSE, Sreyas Institute of Engineering & Technology, Hyderabad, India ABSTRACT:In
Mining Frequency Content of Network Traffic for Intrusion Detection
Mining Frequency Content of Network Traffic for Intrusion Detection Mian Zhou and Sheau-Dong Lang School of Computer Science, and National Center for Forensic Science University of Central Florida, Orlando,
A Frequency-Based Approach to Intrusion Detection
A Frequency-Based Approach to Intrusion Detection Mian Zhou and Sheau-Dong Lang School of Electrical Engineering & Computer Science and National Center for Forensic Science, University of Central Florida,
Improving Intrusion Detection Performance Using Keyword Selection and Neural Networks. Abstract
Improving Intrusion Detection Performance Using Keyword Selection and Neural Networks Richard P. Lippmann MIT Lincoln Laboratory, Rm S4-121 244 Wood Street Lexington, MA 02173-0073 [email protected] phone:
Performance Evaluation of Intrusion Detection Systems using ANN
Performance Evaluation of Intrusion Detection Systems using ANN Khaled Ahmed Abood Omer 1, Fadwa Abdulbari Awn 2 1 Computer Science and Engineering Department, Faculty of Engineering, University of Aden,
Modeling System Calls for Intrusion Detection with Dynamic Window Sizes
Modeling System Calls for Intrusion Detection with Dynamic Window Sizes Eleazar Eskin Computer Science Department Columbia University 5 West 2th Street, New York, NY 27 [email protected] Salvatore
An Efficient Way of Denial of Service Attack Detection Based on Triangle Map Generation
An Efficient Way of Denial of Service Attack Detection Based on Triangle Map Generation Shanofer. S Master of Engineering, Department of Computer Science and Engineering, Veerammal Engineering College,
Detection. Perspective. Network Anomaly. Bhattacharyya. Jugal. A Machine Learning »C) Dhruba Kumar. Kumar KaKta. CRC Press J Taylor & Francis Croup
Network Anomaly Detection A Machine Learning Perspective Dhruba Kumar Bhattacharyya Jugal Kumar KaKta»C) CRC Press J Taylor & Francis Croup Boca Raton London New York CRC Press is an imprint of the Taylor
Impact of Feature Selection on the Performance of Wireless Intrusion Detection Systems
2009 International Conference on Computer Engineering and Applications IPCSIT vol.2 (2011) (2011) IACSIT Press, Singapore Impact of Feature Selection on the Performance of ireless Intrusion Detection Systems
Analyzing TCP Traffic Patterns Using Self Organizing Maps
Analyzing TCP Traffic Patterns Using Self Organizing Maps Stefano Zanero D.E.I.-Politecnico di Milano, via Ponzio 34/5-20133 Milano Italy [email protected] Abstract. The continuous evolution of the
Aggregating Distributed Sensor Data for Network Intrusion Detection
Aggregating Distributed Sensor Data for Network Intrusion Detection JOHN C. McEACHEN, CHENG KAH WAI, and VONDA L. OLSAVSKY Department of Electrical and Computer Engineering Naval Postgraduate School Monterey,
Network Intrusion Simulation Using OPNET
Network Intrusion Simulation Using OPNET Shabana Razak, Mian Zhou, Sheau-Dong Lang* School of Electrical Engineering & Computer Science and National Center for Forensic Science* University of Central Florida,
Using Rough Set and Support Vector Machine for Network Intrusion Detection System Rung-Ching Chen and Kai-Fan Cheng
2009 First Asian Conference on Intelligent Information and Database Systems Using Rough Set and Support Vector Machine for Network Intrusion Detection System Rung-Ching Chen and Kai-Fan Cheng Ying-Hao
An analysis of suitable parameters for efficiently applying K-means clustering to large TCPdump data set using Hadoop framework
An analysis of suitable parameters for efficiently applying K-means clustering to large TCPdump data set using Hadoop framework Jakrarin Therdphapiyanak Dept. of Computer Engineering Chulalongkorn University
CLASSIFYING NETWORK TRAFFIC IN THE BIG DATA ERA
CLASSIFYING NETWORK TRAFFIC IN THE BIG DATA ERA Professor Yang Xiang Network Security and Computing Laboratory (NSCLab) School of Information Technology Deakin University, Melbourne, Australia http://anss.org.au/nsclab
Network Based Intrusion Detection Using Honey pot Deception
Network Based Intrusion Detection Using Honey pot Deception Dr.K.V.Kulhalli, S.R.Khot Department of Electronics and Communication Engineering D.Y.Patil College of Engg.& technology, Kolhapur,Maharashtra,India.
NETWORK INTRUSION DETECTION SYSTEM USING HYBRID CLASSIFICATION MODEL
NETWORK INTRUSION DETECTION SYSTEM USING HYBRID CLASSIFICATION MODEL Prof. Santosh T. Waghmode 1, Prof. Vinod S. Wadne 2 Department of Computer Engineering, 1, 2 JSPM s Imperial College of Engineering
An Evaluation of Machine Learning Method for Intrusion Detection System Using LOF on Jubatus
An Evaluation of Machine Learning Method for Intrusion Detection System Using LOF on Jubatus Tadashi Ogino* Okinawa National College of Technology, Okinawa, Japan. * Corresponding author. Email: [email protected]
Fuzzy Network Profiling for Intrusion Detection
Fuzzy Network Profiling for Intrusion Detection John E. Dickerson ([email protected]) and Julie A. Dickerson ([email protected]) Electrical and Computer Engineering Department Iowa State University
CSCE 465 Computer & Network Security
CSCE 465 Computer & Network Security Instructor: Dr. Guofei Gu http://courses.cse.tamu.edu/guofei/csce465/ Intrusion Detection System 1 Intrusion Definitions A set of actions aimed to compromise the security
Mahalanobis Distance Map Approach for Anomaly Detection
Edith Cowan University Research Online Australian Information Security Management Conference Security Research Institute Conferences 2010 Mahalanobis Distance Map Approach for Anomaly Detection Aruna Jamdagnil
Application of Data Mining Techniques in Intrusion Detection
Application of Data Mining Techniques in Intrusion Detection LI Min An Yang Institute of Technology [email protected] Abstract: The article introduced the importance of intrusion detection, as well as
Handling Intrusion Detection System using Snort Based Statistical Algorithm and Semi-supervised Approach
Research Journal of Applied Sciences, Engineering and Technology 6(16): 2914-2922, 213 ISSN: 24-7459; e-issn: 24-7467 Maxwell Scientific Organization, 213 Submitted: December 1, 212 Accepted: January 11,
How To Prevent Network Attacks
Ali A. Ghorbani Wei Lu Mahbod Tavallaee Network Intrusion Detection and Prevention Concepts and Techniques )Spri inger Contents 1 Network Attacks 1 1.1 Attack Taxonomies 2 1.2 Probes 4 1.2.1 IPSweep and
Developing a hybrid method of Hidden Markov Models and C5.0 as a Intrusion Detection System
, pp.165-174 http://dx.doi.org/10.14257/ijdta.2013.6.5.15 Developing a hybrid method of Hidden Markov Models and C5.0 as a Intrusion Detection System Mahsa Khosronejad, Elham Sharififar, Hasan Ahmadi Torshizi
Layered Approach of Intrusion Detection System with Efficient Alert Aggregation for Heterogeneous Networks
Layered Approach of Intrusion Detection System with Efficient Alert Aggregation for Heterogeneous Networks Lohith Raj S N, Shanthi M B, Jitendranath Mungara Abstract Protecting data from the intruders
International Journal of Computer Science Trends and Technology (IJCST) Volume 3 Issue 3, May-June 2015
RESEARCH ARTICLE OPEN ACCESS Data Mining Technology for Efficient Network Security Management Ankit Naik [1], S.W. Ahmad [2] Student [1], Assistant Professor [2] Department of Computer Science and Engineering
A new Approach for Intrusion Detection in Computer Networks Using Data Mining Technique
A new Approach for Intrusion Detection in Computer Networks Using Data Mining Technique Aida Parbaleh 1, Dr. Heirsh Soltanpanah 2* 1 Department of Computer Engineering, Islamic Azad University, Sanandaj
The Integration of SNORT with K-Means Clustering Algorithm to Detect New Attack
The Integration of SNORT with K-Means Clustering Algorithm to Detect New Attack Asnita Hashim, University of Technology MARA, Malaysia April 14-15, 2011 The Integration of SNORT with K-Means Clustering
Data Mining for Network Intrusion Detection
Data Mining for Network Intrusion Detection S Terry Brugger UC Davis Department of Computer Science Data Mining for Network Intrusion Detection p.1/55 Overview This is important for defense in depth Much
Two State Intrusion Detection System Against DDos Attack in Wireless Network
Two State Intrusion Detection System Against DDos Attack in Wireless Network 1 Pintu Vasani, 2 Parikh Dhaval 1 M.E Student, 2 Head of Department (LDCE-CSE) L.D. College of Engineering, Ahmedabad, India.
Intrusion Detection System using Log Files and Reinforcement Learning
Intrusion Detection System using Log Files and Reinforcement Learning Bhagyashree Deokar, Ambarish Hazarnis Department of Computer Engineering K. J. Somaiya College of Engineering, Mumbai, India ABSTRACT
A Review of Cyber Attack Classification Technique Based on Data Mining and Neural Network Approach
A Review of Cyber Attack Classification Technique Based on Data Mining Neural Network Approach Bhavna Dharamkar 1, Rajni Ranjan Singh 2 M.Tech Scholar 1, Department of Computer Science & Engg, VNS, Bhopal,
Detecting Anomalies in Network Traffic Using Maximum Entropy Estimation
Detecting Anomalies in Network Traffic Using Maximum Entropy Estimation Yu Gu, Andrew McCallum, Don Towsley Department of Computer Science, University of Massachusetts, Amherst, MA 01003 Abstract We develop
Network Intrusion Detection Systems
Network Intrusion Detection Systems False Positive Reduction Through Anomaly Detection Joint research by Emmanuele Zambon & Damiano Bolzoni 7/1/06 NIDS - False Positive reduction through Anomaly Detection
Fuzzy Network Profiling for Intrusion Detection
Fuzzy Network Profiling for Intrusion Detection John E. Dickerson ([email protected]) and Julie A. Dickerson ([email protected]) Electrical and Computer Engineering Department Iowa State University
A Novel Approach for Network Traffic Summarization
A Novel Approach for Network Traffic Summarization Mohiuddin Ahmed, Abdun Naser Mahmood, Michael J. Maher School of Engineering and Information Technology, UNSW Canberra, ACT 2600, Australia, [email protected],[email protected],M.Maher@unsw.
Denial-of-Service Attack Detection Based on Multivariate Correlation Analysis
Denial-of-Service Attack Detection Based on Multivariate Correlation Analysis Zhiyuan Tan 1,2, Aruna Jamdagni 1,2, Xiangjian He 1, Priyadarsi Nanda 1, and Ren Ping Liu 2 1 Centre for Innovation in IT Services
A Neural Network Based System for Intrusion Detection and Classification of Attacks
A Neural Network Based System for Intrusion Detection and Classification of Attacks Mehdi MORADI and Mohammad ZULKERNINE Abstract-- With the rapid expansion of computer networks during the past decade,
Transformation of honeypot raw data into structured data
Transformation of honeypot raw data into structured data 1 Majed SANAN, Mahmoud RAMMAL 2,Wassim RAMMAL 3 1 Lebanese University, Faculty of Sciences. 2 Lebanese University, Director of center of Research
Network- vs. Host-based Intrusion Detection
Network- vs. Host-based Intrusion Detection A Guide to Intrusion Detection Technology 6600 Peachtree-Dunwoody Road 300 Embassy Row Atlanta, GA 30348 Tel: 678.443.6000 Toll-free: 800.776.2362 Fax: 678.443.6477
System for Denial-of-Service Attack Detection Based On Triangle Area Generation
System for Denial-of-Service Attack Detection Based On Triangle Area Generation 1, Heena Salim Shaikh, 2 N Pratik Pramod Shinde, 3 Prathamesh Ravindra Patil, 4 Parag Ramesh Kadam 1, 2, 3, 4 Student 1,
Network Intrusion Detection Using an Improved Competitive Learning Neural Network
Network Intrusion Detection Using an Improved Competitive Learning Neural Network John Zhong Lei and Ali Ghorbani Faculty of Computer Science University of New Brunswick Fredericton, NB, E3B 5A3, Canada
Denial-Of-Service Attack Detection Based On Multivariate Correlation Analysis and Triangle Area Map Generation
Denial-Of-Service Attack Detection Based On Multivariate Correlation Analysis and Triangle Area Map Generation Heena Salim Shaikh, Parag Ramesh Kadam, N Pratik Pramod Shinde, Prathamesh Ravindra Patil,
Intrusion Detection System using Hidden Markov Model (HMM)
IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: 2278-0661, p- ISSN: 2278-8727Volume 10, Issue 3 (Mar. - Apr. 2013), PP 66-70 Intrusion Detection System using Hidden Markov Model (HMM) Megha Bandgar,
Science Park Research Journal
2321-8045 Science Park Research Journal Original Article th INTRUSION DETECTION SYSTEM An Approach for Finding Attacks Ashutosh Kumar and Mayank Kumar Mittra ABSTRACT Traditionally firewalls are used to
A Survey on Outlier Detection Techniques for Credit Card Fraud Detection
IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: 2278-0661, p- ISSN: 2278-8727Volume 16, Issue 2, Ver. VI (Mar-Apr. 2014), PP 44-48 A Survey on Outlier Detection Techniques for Credit Card Fraud
Traffic Prediction in Wireless Mesh Networks Using Process Mining Algorithms
Traffic Prediction in Wireless Mesh Networks Using Process Mining Algorithms Kirill Krinkin Open Source and Linux lab Saint Petersburg, Russia [email protected] Eugene Kalishenko Saint Petersburg
An Artificial Immune Model for Network Intrusion Detection
An Artificial Immune Model for Network Intrusion Detection Jungwon Kim and Peter Bentley Department of Computer Science, University Collge London Gower Street, London, WC1E 6BT, U. K. Phone: +44-171-380-7329,
Topic models for Sentiment analysis: A Literature Survey
Topic models for Sentiment analysis: A Literature Survey Nikhilkumar Jadhav 123050033 June 26, 2014 In this report, we present the work done so far in the field of sentiment analysis using topic models.
Using Data Mining for Mobile Communication Clustering and Characterization
Using Data Mining for Mobile Communication Clustering and Characterization A. Bascacov *, C. Cernazanu ** and M. Marcu ** * Lasting Software, Timisoara, Romania ** Politehnica University of Timisoara/Computer
Botnet Detection Based on Degree Distributions of Node Using Data Mining Scheme
Botnet Detection Based on Degree Distributions of Node Using Data Mining Scheme Chunyong Yin 1,2, Yang Lei 1, Jin Wang 1 1 School of Computer & Software, Nanjing University of Information Science &Technology,
Role of Anomaly IDS in Network
Role of Anomaly IDS in Network SumathyMurugan 1, Dr.M.Sundara Rajan 2 1 Asst. Prof, Department of Computer Science, Thiruthangal Nadar College, Chennai -51. 2 Asst. Prof, Department of Computer Science,
Index Terms Domain name, Firewall, Packet, Phishing, URL.
BDD for Implementation of Packet Filter Firewall and Detecting Phishing Websites Naresh Shende Vidyalankar Institute of Technology Prof. S. K. Shinde Lokmanya Tilak College of Engineering Abstract Packet
KEITH LEHNERT AND ERIC FRIEDRICH
MACHINE LEARNING CLASSIFICATION OF MALICIOUS NETWORK TRAFFIC KEITH LEHNERT AND ERIC FRIEDRICH 1. Introduction 1.1. Intrusion Detection Systems. In our society, information systems are everywhere. They
Development of a Network Intrusion Detection System
Development of a Network Intrusion Detection System (I): Agent-based Design (FLC1) (ii): Detection Algorithm (FLC2) Supervisor: Dr. Korris Chung Please visit my personal homepage www.comp.polyu.edu.hk/~cskchung/fyp04-05/
Intrusion Detection using Artificial Neural Networks with Best Set of Features
728 The International Arab Journal of Information Technology, Vol. 12, No. 6A, 2015 Intrusion Detection using Artificial Neural Networks with Best Set of Features Kaliappan Jayakumar 1, Thiagarajan Revathi
Firewalls and Intrusion Detection
Firewalls and Intrusion Detection What is a Firewall? A computer system between the internal network and the rest of the Internet A single computer or a set of computers that cooperate to perform the firewall
Latent Dirichlet Markov Allocation for Sentiment Analysis
Latent Dirichlet Markov Allocation for Sentiment Analysis Ayoub Bagheri Isfahan University of Technology, Isfahan, Iran Intelligent Database, Data Mining and Bioinformatics Lab, Electrical and Computer
Keywords - Intrusion Detection System, Intrusion Prevention System, Artificial Neural Network, Multi Layer Perceptron, SYN_FLOOD, PING_FLOOD, JPCap
Intelligent Monitoring System A network based IDS SONALI M. TIDKE, Dept. of Computer Science and Engineering, Shreeyash College of Engineering and Technology, Aurangabad (MS), India Abstract Network security
131-1. Adding New Level in KDD to Make the Web Usage Mining More Efficient. Abstract. 1. Introduction [1]. 1/10
1/10 131-1 Adding New Level in KDD to Make the Web Usage Mining More Efficient Mohammad Ala a AL_Hamami PHD Student, Lecturer m_ah_1@yahoocom Soukaena Hassan Hashem PHD Student, Lecturer soukaena_hassan@yahoocom
Network packet payload analysis for intrusion detection
Network packet payload analysis for intrusion detection Sasa Mrdovic Abstract This paper explores possibility of detecting intrusions into computer networks using network packet payload analysis. Quick
Predicting the Risk of Heart Attacks using Neural Network and Decision Tree
Predicting the Risk of Heart Attacks using Neural Network and Decision Tree S.Florence 1, N.G.Bhuvaneswari Amma 2, G.Annapoorani 3, K.Malathi 4 PG Scholar, Indian Institute of Information Technology, Srirangam,
FUZZY DATA MINING AND GENETIC ALGORITHMS APPLIED TO INTRUSION DETECTION
FUZZY DATA MINING AND GENETIC ALGORITHMS APPLIED TO INTRUSION DETECTION Susan M. Bridges [email protected] Rayford B. Vaughn [email protected] 23 rd National Information Systems Security Conference
Intrusion Detection System Based Network Using SNORT Signatures And WINPCAP
Intrusion Detection System Based Network Using SNORT Signatures And WINPCAP Aakanksha Vijay M.tech, Department of Computer Science Suresh Gyan Vihar University Jaipur, India Mrs Savita Shiwani Head Of
CHAPTER 1 INTRODUCTION
21 CHAPTER 1 INTRODUCTION 1.1 PREAMBLE Wireless ad-hoc network is an autonomous system of wireless nodes connected by wireless links. Wireless ad-hoc network provides a communication over the shared wireless
Hybrid Model For Intrusion Detection System Chapke Prajkta P., Raut A. B.
www.ijecs.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume1 Issue 3 Dec 2012 Page No. 151-155 Hybrid Model For Intrusion Detection System Chapke Prajkta P., Raut A. B.
