Forensic Network Traffic Analysis
|
|
|
- Sophie Fields
- 10 years ago
- Views:
Transcription
1 Forensic Network Traffic Analysis Noora Al Khater Department of Informatics King's College London London, United Kingdom Richard E Overill Department of Informatics King's College London London, United Kingdom [email protected] ABSTRACT The nature of information in a network is volatile and dynamic, some precious evidence might be missed. The real-world situations need a quick classification decision before the flow finishes, especially for security and network forensic purposes. Therefore, monitoring network traffic requires a real-time and continuous analysis, to collect valuable evidence such as instant evidences that might be missed with post-mortem analysis (dead forensics). Network traffic classification is considered the first line of defence where a malicious activity can be filtered, identified and detected. In addition, it is the core component in evidence collection and analysis that uses filtered evidence and helps to reduce redundancy. However, most of the existing approaches that deal with collecting evidence from networks are based on post- mortem analysis. Therefore, this research investigates different classification techniques using Machine Learning (ML) algorithms, seeking to identify ways to improve classification methods from a forensic investigator standpoint. KEYWORDS Digital forensics; cyber security; network traffic classification; digital evidence; network analysis 1 INTRODUCTION Analysing network traffic is considered a proactive investigation in network forensics. Monitoring and classifying network traffic correctly can help organisations avoid a lot of harm, and provide them with an intelligible vision of traffic patterns to put a good incident plan response in place. In fact, organisations are looking for more effective methods to solve these problems that caused by increased in number of cyber-crimes that cause genuine harm. There are great historical developments of classification techniques; however, they are not free from drawbacks, which can be outlined in two points. First, traditional techniques (portbased classifications) are unreliable because most of the applications use random or nonstandard ports. Second, even payload-based classification is considered more accurate but this accuracy diminishes when dealing with encrypted traffic; furthermore, this technique has a highly expensive computational cost and may be thwarted by privacy policies because it inspects packet contents. These problems have driven the research community to shift into statistical and behavioral classification using Machine Learning (ML) techniques, which depend on analysis of application patterns that do not require payload inspection. Additionally, the increasing amount of traffic and transmission rates stimulate researchers to look for lightweight algorithms. And the persistence of application developers in inventing new ways to avoid filtering and detection mechanisms of traffic is another motivating factor. This paper structured as follows: Section 2 defines digital forensics and provides background on the forensic model. Section 3 discusses the use of ML algorithms in the field of network traffic analysis and reviews the existing studies. Section 4 outlines the ISBN: SDIWC 1
2 challenges in the field of network traffic classification using ML. Section 5 illustrates the proposed method for forensic network traffic analysis. Section 6 summarises our research. 2 WHAT IS DIGITAL FORENSICS? The Digital Forensics Research Workshop (DFRWS) [1] has defined digital forensics as: The use of scientifically derived and proven methods toward the preservation, collection, validation, identification, analysis, interpretation, documentation, and presentation of digital evidence derived from digital sources for the purpose of facilitation or furthering the reconstruction of events found to be criminal, or helping to anticipate unauthorized actions shown to be disruptive to planned operations. Network forensics is subdomain of digital forensics. It deals with the analysis of network traffic as proactive investigation, and this is different to other areas of digital forensics because it involves volatile information that requires real-time continuous analysis. Network forensics has been defined by DFRWS [1] as: The use of scientifically proven techniques to collect, fuse, identify, examine, correlate, analyze, and document digital evidence from multiple, actively processing and transmitting digital sources for the purpose of uncovering facts related to the planned intent, or measured success of unauthorized activities meant to disrupt, corrupt, and or compromise system components as well as providing information to assist in response to or recovery from these activities. 2.1 Background on Forensic Model For investigation in digital forensic science there are several models, which can be used. For a clear explanation we take a formal comprehensive approach from the DFRWS. The DFRWS model consists of sequential steps in the process of digital forensic analysis [1]. The steps help the practitioners and researchers to conceive of the situation to understand the direction of what they need to focus on. These steps can be seen in Table 1. The linear approach begins with the process of identifying potential evidence. This involves the location of the digital evidence and how to determine the location. For example, in network forensics Intrusion Detection Systems (IDS) can be sources of digital evidence; IDS involves recognising and detecting unusual patterns of flow in the network traffic. The second step is preservation, which is a critical phase for increasing the possibility of a successful investigation. This process starts from acquiring, seizing, and preserving the evidence to create a digital image of the evidence and maintain the chain of custody. The following steps are collection, examination and analysis of the digital evidence to culminate in the final single presentation. Network forensics requires real-time collection of the digital evidence to avoid any missing critical information. However, most of the methods in the collection process are based on post- mortem analysis. The huge amount of collected data needs automated techniques to reduce redundancy, and consequently reduce the analysis time of the evidence [2]. Manual analysis of a complex network attack involving a large amount of data is impossible in a timely fashion, so an automated method is a basic element to identify, collect and link evidence with the criminal action. In addition, the massive amount of traffic needs a huge storage capacity, which costs a lot; this amount of data needs to be filtered to extract related data. Actually, the capture and analysis of network traffic is normally based on sniffing tools, which face difficulty and whose effectiveness diminishes when they deal with encrypted packets. However, analysis techniques based on pattern recognition using ML algorithms have proven promising results. Finally, the last stage of digital forensic investigation is presentation, which entails dealing with legal aspects of the ISBN: SDIWC 2
3 case and presenting the investigation s findings in the court. Table 1. Digital Forensic Investigation Process [1] Identification Event/Crime Detection Resolve Signature Preservation Case Management Imaging Technologies Collection Preservation Approved Methods Examination Preservation Traceability Analysis Preservation Traceability Presentation Documentation Expert Testimony 3 NETWORK TRAFFIC CLASSIFICATION USING ML TECHNIQUES Despite of the fastest and simplest of the previous classification technique (port-based) in monitoring and reporting activity of network traffic, the unreliability of port-based classification has been proved in several published works. For instance, one study [3] stated that the port base analysis method can not classify 30-70% of the internet traffic used in its work. Also, another investigation of the accuracy of port-based classification [4] demonstrated that the accuracy of this traditional technique, using the official IANA list, is not better than 70% of bytes. However, this classification is still used in situations where accuracy is not a critical matter. Profile Detection Anomalous Detection Complaints Chain of Custody Time Synch. Approved Software Approved Hardware Legal Authority Validation Techniques Filtering Techniques Pattern Matching Data Mining Protocols Statistical Clarification Mission Impact Statement Recommended Countermeasure The problems of port-based classification methods and the drawbacks of payload-based classification techniques have motivated researchers to find alternative ways to analyse network traffic using statistical and behavioural properties of the flow without relying on inspection of packet contents. ML techniques have shown promising results in analysing network traffic based on the extracted features of the flow. 3.1 Machine Learning Concepts System Monitoring Audit Analysis Lossless Compression Sampling Data Reduction Hidden Data Discovery Hidden Data Extraction Spatial Link Timeline Statistical Interpretation ML is a core branch of artificial intelligence. It is the science that makes machines able to obtain new information, develop new skills, assess and reorganize existing knowledge, and identify new information. In the early 1990s Shi [5] noted that the distinctive characteristic of intelligence is that machines have the ability to learn form experience automatically. Additionally, in 2000 Witten and Frank spotted that "Things learn when they change their behavior in a way that makes them perform better in the future" [6]. ISBN: SDIWC 3
4 ML techniques are used in several applications such as medical diagnosis, search engines, marketing diagnosis, etc. ML algorithms were developed and their applications disseminated over various fields. The first remarkable work of ML techniques in the field of telecommunications networking was in 1990; this work was an attempt to get the most out of call completion in a circuit switcher [7] saw the start of using ML algorithms to classify internet flow for intrusion detection [8]. This was the spark for a lot of research on applying ML techniques in network traffic classification. 3.2 Types of Machine Learning There are four different types of Machine learning according to Witten and Frank [6]: supervised learning (classification), unsupervised learning (clustering), association, and numeric prediction. Supervised learning uses a number of pre-classified examples, to build classifier rules to identify unknown flow. Unsupervised learning automatically classifies network flow into groups (clusters) of instances that have the same properties without any kind of pre-guidance. Association learning explores the links among features. And in numeric prediction, the prediction result is the numeric volume, not a discrete class. Most of the studies in the field of network traffic classification used supervised learning; a few studies, however, have applied unsupervised learning (clustering) or investigated the use of hybrid techniques (semisupervised) in their analysis of network traffic Supervised Classification Supervised classification techniques use preclassified (pre-labelled) samples during the training phase to build a classifier (model) with a set of rules in order to classify new samples [9]. The information learnt can be presented in the form of classification rules, decision tree, flowchart, etc. This information can then be used to identify similar examples. Two main processes are inherent in supervised classification namely, the training process and then the final step, the testing process. The testing phase is the following process where the model (classifier) is used to identify new flow. Supervised techniques are suitable for identifying specific types of applications. The effectiveness of these techniques is subject to a training phase (training set), because these methods of classification focus on forming the relationships of input/output. There are a number of different ML algorithms that can be used in classification. Each algorithm is distinct and different in the construction process of the model and the output. Examples of these algorithms are the Nearest Neighbours (NN), Linear Discriminate Analysis (LDA) and Quadratic Discriminant Analysis (QDA) algorithms. The authors in [10], applied a statistical signature-based approach using these ML algorithms to classify IP traffic. Another study [11] used the supervised ML naive Bayes technique to classify network traffic. In the training phase they used 248 full flow-based features. They were able to achieve 65% flow accuracy in their classification results with a simple Naive Bayes technique. And they enhanced the results of the classification by using the Naive Bayes Kernel Estimation (NBKE) and Fast Correlation-Based Filter (FCBF) techniques, enhancing flow accuracy results to 95% overall. The results of this study were improved upon in [12] by applying the Bayesian neural network technique. The authors were able to achieve 99% accuracy when the classifier was trained and tested at the same time and 95% when the classifier was tested eight months later. In [13], the authors applied Naive Bayes ML algorithm to classify network traffic based on features extracted from sub-flows instead of full flows. With this technique they were able to avoid the classifier to look for the start of the flow which could be missed. The authors in ISBN: SDIWC 4
5 [14] extended their previous study [13] by using Naive Bayes and decision-tree algorithms. They affirmed once again that performance of classifiers is enhanced when they are trained using sub-flows with the same datasets as in [13]. They also compared their results with the poor results of classification based on statistical features extracted from bidirectional flows. Another work [15] used Genetic Algorithm (GA) for feature selection, applied three different algorithms (Naive Bayesian classifier with Kernel Estimation (NBKE), Decision Tree J48, and the Reduced Error Pruning Tree (REPTree)) and compared their classification results. The classification outcomes show that the performance of tree J48 and REPTree are better than NBKE with high accuracy in the results. This study mentioned the influence of using data from several sites for training and testing processes. Although the accuracy result is based on overall results, it is noteworthy that high accuracy is provided by the first 10 packets used in the classification. This study raises the question: If different applications were used, how different would the results be? Unsupervised Classification In contrast to supervised classification, unsupervised classification techniques automatically classify flow without any guidance, trying to find internalised heuristics from unlabelled data based on discovering patterns [16]. They do this by clustering instances that have relatively similar characteristics or are identical in terms of input data together in groups. Some of the instances are moved into only one group, which can be called a limited group. Other situations involve overlapping, when the same instance can be found in different groups. The basic unsupervised techniques are the k- means algorithm, probability- based clustering, and incremental clustering [6]. Unsupervised technique was studied in [17] by applying the Expectation Maximisation (EM) algorithm [18] to classify network traffic based on features extracted from full flows. Using this technique, the researchers grouped applications into several groups based on characteristics. Their technique can be taken as an initial step in identifying unknown network traffic. Other researchers, such as [19], proposed a method to classify TCP flow by applying unsupervised ML (Simple K-Means algorithm). Their proposed classification technique exploits features taken from the first packets of the TCP flow. This contrasts with the previous study [20], which used the features of full flows. This proposed approach allows a quick identification of the applications that flow over the network by examining the first few packets only. This classification method is based on the hypothesis that assumes the classifier can always know the beginning of every flow. This is not the case in reality, as in real-world network traffic the start of the flow might be missed. Therefore, the classifier needs to consider different conditions and scenarios; otherwise the capability of the classifier decrease in situations different than studied conditions Semi-Supervised Classification Semi-supervised classification combines supervised and unsupervised techniques, taking advantage of both techniques by having the ability to detect new applications like unsupervised techniques, which reduces the performance degradation of supervised classification when dealing with situations different than studied conditions where new application emerges. One of the significant pieces of research on semi-supervised techniques was conducted by [21]. The proposed classification method in this study started with supplying a clustering algorithm with a training dataset that combined labelled flows and unlabelled flows. The ISBN: SDIWC 5
6 provided labelled flows help a clustering algorithm to map clusters with labelled flows. The unknown flows are allocated to the closest cluster based on the distance metric they used. The initial results with a semi-supervised approach using the K-Means clustering algorithm is promising. Further details of the results can be found in [22]. 4 RESEARCH CHALLENGES After considering the most recent developments in field of network traffic analysis using ML, it is clear that there are some problems associated with the methodology that have been used to analyse and classify network traffic in most of the published works. However, there is still space for significant contributions. Real-world situations require prompt analysis-based decision-making before the network flow ends especially in critical situations involving the identification and detection of security incidents, for example. It is important to mention that the majority of the proposed techniques deteriorate when dealing with different conditions than ones for which they are best suited, like coping with a huge amount of network traffic (i.e. real situations). This means a lot of applications might not carry out classification and identification correctly; hence, valuable forensic evidence might be missed. Also, it is notable that most studies applied ML techniques using features extracted from full flows, whereas the results of classifying using sub-flows outperformed the results of studies using full flows. A very few studies, including [13, 23], investigated this. Indeed, for security analysis purposes the speed in identifying network traffic is also required as the accuracy of the results. The problem of classifying using full flows is that if the beginning of the flow is missed, performance of the classifier diminishes. In addition, losing the beginning of the packet is a very common scenario in realworld network traffic. In point of fact and from a network forensics and security standpoint, delay, fragmentation, packet loss, and emergence of a new application are very important aspects that need to be considered in the performance evaluation of the classifier for more effective and realistic classification results, however most of the studies in this field have not investigated these issues. Furthermore, unsupervised techniques have not been used widely in classifying network traffic, despite the fact that these techniques have the ability to identify unknown applications if used properly or combined with supervised algorithms to enhance their effectiveness in analysing network traffic. 5 The PROPOSED TECHNIQUE Taking account of these gaps in the field and the importance of correctly and effectively classifying network traffic as a kind of proactive investigation, this research will investigate different network traffic classification techniques relying on the analysis of statistical flows using ML algorithms, without inspecting packet contents or using traditional techniques (port-based classification). The sequential steps of our work as illustrated in Figure 1. The first step involves capturing network traffic to create an appropriate dataset for our investigation. The second step consists of extracting features, such as the duration and length of the packet and inter-packet arrival times, from the sub-flow. We chose to work with features extracted from sub-flow because we believe this is the fastest way to analysis network traffic instead of using full-flow especially for security and forensic aspects. The extracted features will be used to train the classifier in the supervised techniques stage, with the endpoint of analysing network traffic smoothly. There is the high expectation that the classifier would not be able to distinguish a new application properly, if we were to use several datasets other than that on which the classifier ISBN: SDIWC 6
7 was trained; this study looks to investigate this hypothesis by adding unseen examples to various datasets. The performance of the supervised classifier will be evaluated, based on its ability to identify unseen applications; this is an important aspect that needs to be considered, for more realistic scenario. In the next stage, the objective will be to enhance the performance of the clarifier by combining supervised and unsupervised learning techniques. The aim in this stage will be to leverage the ability of unsupervised algorithms to identify unclassified applications. We will then evaluate the results of using both types of technique, to determine any differences in performance. In the third stage, we will investigate the capability of unsupervised techniques to work independently. Through this work, we will look to find a way of improving the performance of classification techniques, without relying solely on the use of supervised techniques. Additionally, we look also to emphasize the importance of apply unsupervised techniques in network traffic analysis and investigate the ability of these techniques to distinguish new and unseen applications that could be malicious in nature. The idea behind this research is that we can evaluate the extent of their effectiveness in coping with real-world situations situations that require both the prompt recognition of application type in the network before the flow ends, and the making of quick decisions. Such timeliness is critical, as many criminal incidents could be detected and prevented before they can inflict extensive damage. This impetus explains our motivation in choosing to apply unsupervised techniques to identify unseen applications in forensic network traffic analysis. Figure 1. The Workflow of Forensic Network Traffic Analysis 6 CONCLUSION Network traffic is a source of evidence that needs to be correctly classified immediately. Detection and response must occur prior to the attack. As a result, a real-time analysis of the application and automated classification is required to analyse the network, which is a valuable source of forensic evidence. Consequently, this provides structured forensic investigations of network security incidents. However, most of the evidence collection techniques for network forensics are rely on post- mortem analysis. Hence, a lot of precious evidence for investigation might be lost, which can lead to an inaccurate conclusion due to the weak evidence. In fact, to build a clear and strong case lawyers need more corroborating evidence, which calls for real-time collection. ISBN: SDIWC 7
8 Therefore, this research aims to identify methods that can improve classification techniques by using ML algorithms, and create a balance among accuracy, efficiency, and cost, because a large amount of network traffic is still unclassified. REFERENCES [1] Digital Forensics Research Workshop. (2001, November). A road map for digital forensics research Retrieved from [2] W. Wang and T. Daniels. Building Evidence Graphs for Network Forensics Analysis, in Proceedings of the 21st Annual Computer Security Applications Conference (ACSAC 2005). September [3] A. Madhukar and C. Williamson, A longitudinal study of P2P traffic classification, in 14th IEEE International Symposium on Modeling, Analysis, and Simulation of Computer and Telecommunication Systems, September [4] A. W. Moore and K. Papagiannaki, Toward the accurate identification of network applications, in Passive and Active Measurement, Boston, MA, March 2005, pp [5] Z. Shi, Principles of Machine Learning. International Academic Publishers, [6] I. Witten and E. Frank, Data Mining: Practical Machine Learning Tools and Techniques with Java Implementations, 2nd ed., Morgan Kaufmann Publishers, [7] B. Silver, Netman: A learning network traffic controller, in Proceedings of the Third International Conference on Industrial and Engineering Applications of Artificial Intelligence and Expert Systems, Association for Computing Machinery, [8] J. Frank, Machine learning and intrusion detection: Current and future directions, in Proceedings of the National 17th Computer Security Conference, Washington, D.C., October [9] Y. Reich and J. S. Fenves, The formation and use of abstract concepts in design, in Concept Formation: Knowledge and Experience in Unsupervised Learning, D. H. Fisher and M. J. Pazzani, Eds. Morgan Kaufmann, [10] M. Roughan, S. Sen, O. Spatscheck, and N. Duffield, Class-of-service mapping for QoS: A statistical signature-based approach to IP traffic classification, in Proceedings of ACM/SIGCOMM Internet Measurement Conference (IMC) 2004, Taormina, Sicily, Italy, October [11] A. Moore and D. Zuev, Internet traffic classification using Bayesian analysis techniques, in ACM International Conference on Measurement and Modeling of Computer Systems (SIGMETRICS) 2005, Banff, Alberta, Canada, June [12] T. Auld, A. W. Moore, and S. F. Gull, Bayesian neural networks for Internet traffic classification, IEEE Transactions on Neural Networks, no. 1, pp , January [13] T. Nguyen and G. Armitage, Training on multiple sub-flows to optimise the use of machine-learning classifiers in real-world IP networks, in Proceedings of the IEEE 31st Conference on Local Computer Networks, Tampa, FL, pp , November [14] T. Nguyen and G. Armitage, Synthetic sub-flow pairs for timely and stable IP traffic identification, in Proceedings of the Australian Telecommunication Networks and Application Conference, Melbourne, Australia, December [15] J. Park, H.-R. Tyan, and K. C.-C. J. Kuo, GA-based Internet traffic classification technique for QoS provisioning, in Proceedings of the 2006 International Conference on Intelligent Information Hiding and Multimedia Signal Processing, Pasadena, CA, December [16] H. D. Fisher, J. M. Pazzani, and P. Langley, Concept Formation: Knowledge and Experience in Unsupervised Learning. Morgan Kaufmann, [17] A. Mcgregor, M. Hall, P. Lorier, and J. Brunskill, Flow clustering using machine learning techniques, in Proceedings of the Passive and Active Measurement Workshop 2004, Antibes Juanles-Pins, France, pp , April [18] A. Dempster, N. Laird, and D. Rubin, Maximum likelihood from incomplete data via the EM algorithm, J. Roy. Stat. Soc., vol. 30, no. 1, pp. 1 38, [19] L. Bernaille, R. Teixeira, I. Akodkenou, A. Soule, and K. Salamatian, Traffic classification on the fly, ACM SIGCOMM Comput. Commun. Rev., vol. 36, no. 2, pp , [20] S. Zander, T. Nguyen, and G. Armitage, Automated traffic classification and application identification using machine learning, in IEEE 30th Conference Local Computer Networks 2005, Sydney, Australia, pp , November [21] J. Erman, A. Mahanti, M. Arlitt, I. Cohen, and C. Williamson, Semisupervised network traffic classification, ACM International Conference on Measurement and Modeling of Computer Systems (SIGMETRICS) Perf. Eval. Rev., vol. 35, no. 1, pp , ISBN: SDIWC 8
9 [22] J. Erman, A. Mahanti, M. Arlitt, I. Cohen, and C. Williamson. Offline/realtime traffic classification using semi-supervised learning. Perf. Eval., vol., 64 nos. 9 12, pp , [23] T. Nguyen, G. Armitage, P. Branch, and S. Zander, Timely and continuous machine-learning-based classification for interactive IP traffic, IEEE/ACM Trans. Netw., vol. 20, no. 6, pp , December ISBN: SDIWC 9
CLASSIFYING NETWORK TRAFFIC IN THE BIG DATA ERA
CLASSIFYING NETWORK TRAFFIC IN THE BIG DATA ERA Professor Yang Xiang Network Security and Computing Laboratory (NSCLab) School of Information Technology Deakin University, Melbourne, Australia http://anss.org.au/nsclab
Traffic Classification with Sampled NetFlow
Traffic Classification with Sampled NetFlow Valentín Carela-Español, Pere Barlet-Ros, Josep Solé-Pareta Universitat Politècnica de Catalunya (UPC) {vcarela,pbarlet,pareta}@ac.upc.edu Abstract The traffic
How To Classify Network Traffic In Real Time
22 Approaching Real-time Network Traffic Classification ISSN 1470-5559 Wei Li, Kaysar Abdin, Robert Dann and Andrew Moore RR-06-12 October 2006 Department of Computer Science Approaching Real-time Network
Encrypted Internet Traffic Classification Method based on Host Behavior
Encrypted Internet Traffic Classification Method based on Host Behavior 1,* Chengjie GU, 1 Shunyi ZHANG, 2 Xiaozhen XUE 1 Institute of Information Network Technology, Nanjing University of Posts and Telecommunications,
Online Classification of Network Flows
2009 Seventh Annual Communications Networks and Services Research Conference Online Classification of Network Flows Mahbod Tavallaee, Wei Lu and Ali A. Ghorbani Faculty of Computer Science, University
ATCM: A Novel Agent-based Peer-to-Peer Traffic Control Management
Journal of Computational Information Systems 7: 7 (2011) 2307-2314 Available at http://www.jofcis.com ATCM: A Novel Agent-based Peer-to-Peer Traffic Control Management He XU 1,, Suoping WANG 2, Ruchuan
International Journal of Computer Science Trends and Technology (IJCST) Volume 3 Issue 3, May-June 2015
RESEARCH ARTICLE OPEN ACCESS Data Mining Technology for Efficient Network Security Management Ankit Naik [1], S.W. Ahmad [2] Student [1], Assistant Professor [2] Department of Computer Science and Engineering
Near Real Time Online Flow-based Internet Traffic Classification Using Machine Learning (C4.5)
Near Real Time Online Flow-based Internet Traffic Classification Using Machine Learning (C4.5) Abuagla Babiker Mohammed Faculty of Electrical Engineering (FKE) Deprtment of Microelectronics and Computer
A Review of Anomaly Detection Techniques in Network Intrusion Detection System
A Review of Anomaly Detection Techniques in Network Intrusion Detection System Dr.D.V.S.S.Subrahmanyam Professor, Dept. of CSE, Sreyas Institute of Engineering & Technology, Hyderabad, India ABSTRACT:In
DATA MINING TECHNIQUES AND APPLICATIONS
DATA MINING TECHNIQUES AND APPLICATIONS Mrs. Bharati M. Ramageri, Lecturer Modern Institute of Information Technology and Research, Department of Computer Application, Yamunanagar, Nigdi Pune, Maharashtra,
Hadoop Technology for Flow Analysis of the Internet Traffic
Hadoop Technology for Flow Analysis of the Internet Traffic Rakshitha Kiran P PG Scholar, Dept. of C.S, Shree Devi Institute of Technology, Mangalore, Karnataka, India ABSTRACT: Flow analysis of the internet
A Preliminary Performance Comparison of Two Feature Sets for Encrypted Traffic Classification
A Preliminary Performance Comparison of Two Feature Sets for Encrypted Traffic Classification Riyad Alshammari and A. Nur Zincir-Heywood Dalhousie University, Faculty of Computer Science {riyad, zincir}@cs.dal.ca
Realtime Classification for Encrypted Traffic
Realtime Classification for Encrypted Traffic Roni Bar-Yanai 1, Michael Langberg 2,, David Peleg 3,, and Liam Roditty 4 1 Cisco, Netanya, Israel [email protected] 2 Computer Science Division, Open University
Network Intrusion Detection Systems
Network Intrusion Detection Systems False Positive Reduction Through Anomaly Detection Joint research by Emmanuele Zambon & Damiano Bolzoni 7/1/06 NIDS - False Positive reduction through Anomaly Detection
Web Forensic Evidence of SQL Injection Analysis
International Journal of Science and Engineering Vol.5 No.1(2015):157-162 157 Web Forensic Evidence of SQL Injection Analysis 針 對 SQL Injection 攻 擊 鑑 識 之 分 析 Chinyang Henry Tseng 1 National Taipei University
An apparatus for P2P classification in Netflow traces
An apparatus for P2P classification in Netflow traces Andrew M Gossett, Ioannis Papapanagiotou and Michael Devetsikiotis Electrical and Computer Engineering, North Carolina State University, Raleigh, USA
A Novel Distributed Denial of Service (DDoS) Attacks Discriminating Detection in Flash Crowds
International Journal of Research Studies in Science, Engineering and Technology Volume 1, Issue 9, December 2014, PP 139-143 ISSN 2349-4751 (Print) & ISSN 2349-476X (Online) A Novel Distributed Denial
Traffic Analysis of Mobile Broadband Networks
Traffic Analysis of Mobile Broadband Networks Geza Szabo,Daniel Orincsay,Balazs Peter Gero,Sandor Gyori,Tamas Borsos TrafficLab, Ericsson Research, Budapest, Hungary Email:{geza.szabo,daniel.orincsay,
NEURAL NETWORKS IN DATA MINING
NEURAL NETWORKS IN DATA MINING 1 DR. YASHPAL SINGH, 2 ALOK SINGH CHAUHAN 1 Reader, Bundelkhand Institute of Engineering & Technology, Jhansi, India 2 Lecturer, United Institute of Management, Allahabad,
Impact of Feature Selection on the Performance of Wireless Intrusion Detection Systems
2009 International Conference on Computer Engineering and Applications IPCSIT vol.2 (2011) (2011) IACSIT Press, Singapore Impact of Feature Selection on the Performance of ireless Intrusion Detection Systems
The Applications of Deep Learning on Traffic Identification
The Applications of Deep Learning on Traffic Identification Zhanyi Wang [email protected] Abstract Generally speaking, most systems of network traffic identification are based on features. The features
An Introduction to Data Mining. Big Data World. Related Fields and Disciplines. What is Data Mining? 2/12/2015
An Introduction to Data Mining for Wind Power Management Spring 2015 Big Data World Every minute: Google receives over 4 million search queries Facebook users share almost 2.5 million pieces of content
Prediction of Stock Performance Using Analytical Techniques
136 JOURNAL OF EMERGING TECHNOLOGIES IN WEB INTELLIGENCE, VOL. 5, NO. 2, MAY 2013 Prediction of Stock Performance Using Analytical Techniques Carol Hargreaves Institute of Systems Science National University
Using Data Mining for Mobile Communication Clustering and Characterization
Using Data Mining for Mobile Communication Clustering and Characterization A. Bascacov *, C. Cernazanu ** and M. Marcu ** * Lasting Software, Timisoara, Romania ** Politehnica University of Timisoara/Computer
International Journal of Computer Science Trends and Technology (IJCST) Volume 2 Issue 3, May-Jun 2014
RESEARCH ARTICLE OPEN ACCESS A Survey of Data Mining: Concepts with Applications and its Future Scope Dr. Zubair Khan 1, Ashish Kumar 2, Sunny Kumar 3 M.Tech Research Scholar 2. Department of Computer
Financial Trading System using Combination of Textual and Numerical Data
Financial Trading System using Combination of Textual and Numerical Data Shital N. Dange Computer Science Department, Walchand Institute of Rajesh V. Argiddi Assistant Prof. Computer Science Department,
Predicting the Risk of Heart Attacks using Neural Network and Decision Tree
Predicting the Risk of Heart Attacks using Neural Network and Decision Tree S.Florence 1, N.G.Bhuvaneswari Amma 2, G.Annapoorani 3, K.Malathi 4 PG Scholar, Indian Institute of Information Technology, Srirangam,
Advanced Threat Protection with Dell SecureWorks Security Services
Advanced Threat Protection with Dell SecureWorks Security Services Table of Contents Summary... 2 What are Advanced Threats?... 3 How do advanced threat actors operate?... 3 Addressing the Threat... 5
Intrusion Detection via Machine Learning for SCADA System Protection
Intrusion Detection via Machine Learning for SCADA System Protection S.L.P. Yasakethu Department of Computing, University of Surrey, Guildford, GU2 7XH, UK. [email protected] J. Jiang Department
Customer Classification And Prediction Based On Data Mining Technique
Customer Classification And Prediction Based On Data Mining Technique Ms. Neethu Baby 1, Mrs. Priyanka L.T 2 1 M.E CSE, Sri Shakthi Institute of Engineering and Technology, Coimbatore 2 Assistant Professor
Random forest algorithm in big data environment
Random forest algorithm in big data environment Yingchun Liu * School of Economics and Management, Beihang University, Beijing 100191, China Received 1 September 2014, www.cmnt.lv Abstract Random forest
Network Based Intrusion Detection Using Honey pot Deception
Network Based Intrusion Detection Using Honey pot Deception Dr.K.V.Kulhalli, S.R.Khot Department of Electronics and Communication Engineering D.Y.Patil College of Engg.& technology, Kolhapur,Maharashtra,India.
A Study Of Bagging And Boosting Approaches To Develop Meta-Classifier
A Study Of Bagging And Boosting Approaches To Develop Meta-Classifier G.T. Prasanna Kumari Associate Professor, Dept of Computer Science and Engineering, Gokula Krishna College of Engg, Sullurpet-524121,
STUDY OF IMPLEMENTATION OF INTRUSION DETECTION SYSTEM (IDS) VIA DIFFERENT APPROACHS
STUDY OF IMPLEMENTATION OF INTRUSION DETECTION SYSTEM (IDS) VIA DIFFERENT APPROACHS SACHIN MALVIYA Student, Department of Information Technology, Medicaps Institute of Science & Technology, INDORE (M.P.)
An Introduction to Data Mining
An Introduction to Intel Beijing [email protected] January 17, 2014 Outline 1 DW Overview What is Notable Application of Conference, Software and Applications Major Process in 2 Major Tasks in Detail
Insider Threat Detection Using Graph-Based Approaches
Cybersecurity Applications & Technology Conference For Homeland Security Insider Threat Detection Using Graph-Based Approaches William Eberle Tennessee Technological University [email protected] Lawrence
A survey on Data Mining based Intrusion Detection Systems
International Journal of Computer Networks and Communications Security VOL. 2, NO. 12, DECEMBER 2014, 485 490 Available online at: www.ijcncs.org ISSN 2308-9830 A survey on Data Mining based Intrusion
KEITH LEHNERT AND ERIC FRIEDRICH
MACHINE LEARNING CLASSIFICATION OF MALICIOUS NETWORK TRAFFIC KEITH LEHNERT AND ERIC FRIEDRICH 1. Introduction 1.1. Intrusion Detection Systems. In our society, information systems are everywhere. They
IDENTIFYING BANK FRAUDS USING CRISP-DM AND DECISION TREES
IDENTIFYING BANK FRAUDS USING CRISP-DM AND DECISION TREES Bruno Carneiro da Rocha 1,2 and Rafael Timóteo de Sousa Júnior 2 1 Bank of Brazil, Brasília-DF, Brazil [email protected] 2 Network Engineering
Network Machine Learning Research Group. Intended status: Informational October 19, 2015 Expires: April 21, 2016
Network Machine Learning Research Group S. Jiang Internet-Draft Huawei Technologies Co., Ltd Intended status: Informational October 19, 2015 Expires: April 21, 2016 Abstract Network Machine Learning draft-jiang-nmlrg-network-machine-learning-00
Mobile Phone APP Software Browsing Behavior using Clustering Analysis
Proceedings of the 2014 International Conference on Industrial Engineering and Operations Management Bali, Indonesia, January 7 9, 2014 Mobile Phone APP Software Browsing Behavior using Clustering Analysis
Implementation of Botcatch for Identifying Bot Infected Hosts
Implementation of Botcatch for Identifying Bot Infected Hosts GRADUATE PROJECT REPORT Submitted to the Faculty of The School of Engineering & Computing Sciences Texas A&M University-Corpus Christi Corpus
Packet Flow Analysis and Congestion Control of Big Data by Hadoop
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 4, Issue. 6, June 2015, pg.456
MS1b Statistical Data Mining
MS1b Statistical Data Mining Yee Whye Teh Department of Statistics Oxford http://www.stats.ox.ac.uk/~teh/datamining.html Outline Administrivia and Introduction Course Structure Syllabus Introduction to
MACHINE LEARNING BASICS WITH R
MACHINE LEARNING [Hands-on Introduction of Supervised Machine Learning Methods] DURATION 2 DAY The field of machine learning is concerned with the question of how to construct computer programs that automatically
SURVEY OF INTRUSION DETECTION SYSTEM
SURVEY OF INTRUSION DETECTION SYSTEM PRAJAPATI VAIBHAVI S. SHARMA DIPIKA V. ASST. PROF. ASST. PROF. MANISH INSTITUTE OF COMPUTER STUDIES MANISH INSTITUTE OF COMPUTER STUDIES VISNAGAR VISNAGAR GUJARAT GUJARAT
DECISION TREE INDUCTION FOR FINANCIAL FRAUD DETECTION USING ENSEMBLE LEARNING TECHNIQUES
DECISION TREE INDUCTION FOR FINANCIAL FRAUD DETECTION USING ENSEMBLE LEARNING TECHNIQUES Vijayalakshmi Mahanra Rao 1, Yashwant Prasad Singh 2 Multimedia University, Cyberjaya, MALAYSIA 1 [email protected]
STANDARDISATION AND CLASSIFICATION OF ALERTS GENERATED BY INTRUSION DETECTION SYSTEMS
STANDARDISATION AND CLASSIFICATION OF ALERTS GENERATED BY INTRUSION DETECTION SYSTEMS Athira A B 1 and Vinod Pathari 2 1 Department of Computer Engineering,National Institute Of Technology Calicut, India
Robust Network Traffic Classification
IEEE/ACM TRANSACTIONS ON NETWORKING 1 Robust Network Traffic Classification Jun Zhang, Member, IEEE, XiaoChen, Student Member, IEEE, YangXiang, Senior Member, IEEE, Wanlei Zhou, Senior Member, IEEE, and
Data Cleansing for Remote Battery System Monitoring
Data Cleansing for Remote Battery System Monitoring Gregory W. Ratcliff Randall Wald Taghi M. Khoshgoftaar Director, Life Cycle Management Senior Research Associate Director, Data Mining and Emerson Network
131-1. Adding New Level in KDD to Make the Web Usage Mining More Efficient. Abstract. 1. Introduction [1]. 1/10
1/10 131-1 Adding New Level in KDD to Make the Web Usage Mining More Efficient Mohammad Ala a AL_Hamami PHD Student, Lecturer m_ah_1@yahoocom Soukaena Hassan Hashem PHD Student, Lecturer soukaena_hassan@yahoocom
Healthcare Measurement Analysis Using Data mining Techniques
www.ijecs.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume 03 Issue 07 July, 2014 Page No. 7058-7064 Healthcare Measurement Analysis Using Data mining Techniques 1 Dr.A.Shaik
Comparison of K-means and Backpropagation Data Mining Algorithms
Comparison of K-means and Backpropagation Data Mining Algorithms Nitu Mathuriya, Dr. Ashish Bansal Abstract Data mining has got more and more mature as a field of basic research in computer science and
Lightweight Detection of DoS Attacks
Lightweight Detection of DoS Attacks Sirikarn Pukkawanna *, Vasaka Visoottiviseth *, Panita Pongpaibool * Department of Computer Science, Mahidol University, Rama 6 Rd., Bangkok 10400, THAILAND E-mail:
Symantec Cyber Threat Analysis Program Program Overview. Symantec Cyber Threat Analysis Program Team
Symantec Cyber Threat Analysis Program Symantec Cyber Threat Analysis Program Team White Paper: Symantec Security Intelligence Services Symantec Cyber Threat Analysis Program Contents Overview...............................................................................................
On A Network Forensics Model For Information Security
On A Network Forensics Model For Information Security Ren Wei School of Information, Zhongnan University of Economics and Law, Wuhan, 430064 [email protected] Abstract: The employment of a patchwork
A Survey on Intrusion Detection System with Data Mining Techniques
A Survey on Intrusion Detection System with Data Mining Techniques Ms. Ruth D 1, Mrs. Lovelin Ponn Felciah M 2 1 M.Phil Scholar, Department of Computer Science, Bishop Heber College (Autonomous), Trichirappalli,
Bisecting K-Means for Clustering Web Log data
Bisecting K-Means for Clustering Web Log data Ruchika R. Patil Department of Computer Technology YCCE Nagpur, India Amreen Khan Department of Computer Technology YCCE Nagpur, India ABSTRACT Web usage mining
Three types of messages: A, B, C. Assume A is the oldest type, and C is the most recent type.
Chronological Sampling for Email Filtering Ching-Lung Fu 2, Daniel Silver 1, and James Blustein 2 1 Acadia University, Wolfville, Nova Scotia, Canada 2 Dalhousie University, Halifax, Nova Scotia, Canada
ANALYSIS OF FEATURE SELECTION WITH CLASSFICATION: BREAST CANCER DATASETS
ANALYSIS OF FEATURE SELECTION WITH CLASSFICATION: BREAST CANCER DATASETS Abstract D.Lavanya * Department of Computer Science, Sri Padmavathi Mahila University Tirupati, Andhra Pradesh, 517501, India [email protected]
ARTIFICIAL INTELLIGENCE (CSCU9YE) LECTURE 6: MACHINE LEARNING 2: UNSUPERVISED LEARNING (CLUSTERING)
ARTIFICIAL INTELLIGENCE (CSCU9YE) LECTURE 6: MACHINE LEARNING 2: UNSUPERVISED LEARNING (CLUSTERING) Gabriela Ochoa http://www.cs.stir.ac.uk/~goc/ OUTLINE Preliminaries Classification and Clustering Applications
Efficient Security Alert Management System
Efficient Security Alert Management System Minoo Deljavan Anvary IT Department School of e-learning Shiraz University Shiraz, Fars, Iran Majid Ghonji Feshki Department of Computer Science Qzvin Branch,
International Journal of Advance Research in Computer Science and Management Studies
Volume 2, Issue 12, December 2014 ISSN: 2321 7782 (Online) International Journal of Advance Research in Computer Science and Management Studies Research Article / Survey Paper / Case Study Available online
Adaptive Discriminating Detection for DDoS Attacks from Flash Crowds Using Flow. Feedback
Adaptive Discriminating Detection for DDoS Attacks from Flash Crowds Using Flow Correlation Coeff icient with Collective Feedback N.V.Poorrnima 1, K.ChandraPrabha 2, B.G.Geetha 3 Department of Computer
Big Data Classification: Problems and Challenges in Network Intrusion Prediction with Machine Learning
Big Data Classification: Problems and Challenges in Network Intrusion Prediction with Machine Learning By: Shan Suthaharan Suthaharan, S. (2014). Big data classification: Problems and challenges in network
AUTONOMOUS NETWORK SECURITY FOR DETECTION OF NETWORK ATTACKS
AUTONOMOUS NETWORK SECURITY FOR DETECTION OF NETWORK ATTACKS Nita V. Jaiswal* Prof. D. M. Dakhne** Abstract: Current network monitoring systems rely strongly on signature-based and supervised-learning-based
A Catechistic Method for Traffic Pattern Discovery in MANET
A Catechistic Method for Traffic Pattern Discovery in MANET R. Saranya 1, R. Santhosh 2 1 PG Scholar, Computer Science and Engineering, Karpagam University, Coimbatore. 2 Assistant Professor, Computer
A statistical approach to IP-level classification of network traffic
A statistical approach to IP-level classification of network traffic Manuel Crotti, Francesco Gringoli, Paolo Pelosato, Luca Salgarelli DEA, Università degli Studi di Brescia, via Branze, 38, 25123 Brescia,
HYBRID INTRUSION DETECTION FOR CLUSTER BASED WIRELESS SENSOR NETWORK
HYBRID INTRUSION DETECTION FOR CLUSTER BASED WIRELESS SENSOR NETWORK 1 K.RANJITH SINGH 1 Dept. of Computer Science, Periyar University, TamilNadu, India 2 T.HEMA 2 Dept. of Computer Science, Periyar University,
Toward line rate Traffic Classification
Toward line rate Traffic Classification Niccolo' Cascarano Politecnico di Torino http://sites.google.com/site/fulviorisso/ 1 Background In the last years many new traffic classification algorithms based
Predicting Student Performance by Using Data Mining Methods for Classification
BULGARIAN ACADEMY OF SCIENCES CYBERNETICS AND INFORMATION TECHNOLOGIES Volume 13, No 1 Sofia 2013 Print ISSN: 1311-9702; Online ISSN: 1314-4081 DOI: 10.2478/cait-2013-0006 Predicting Student Performance
A new Approach for Intrusion Detection in Computer Networks Using Data Mining Technique
A new Approach for Intrusion Detection in Computer Networks Using Data Mining Technique Aida Parbaleh 1, Dr. Heirsh Soltanpanah 2* 1 Department of Computer Engineering, Islamic Azad University, Sanandaj
Intrusion Detection System using Log Files and Reinforcement Learning
Intrusion Detection System using Log Files and Reinforcement Learning Bhagyashree Deokar, Ambarish Hazarnis Department of Computer Engineering K. J. Somaiya College of Engineering, Mumbai, India ABSTRACT
An Overview of Knowledge Discovery Database and Data mining Techniques
An Overview of Knowledge Discovery Database and Data mining Techniques Priyadharsini.C 1, Dr. Antony Selvadoss Thanamani 2 M.Phil, Department of Computer Science, NGM College, Pollachi, Coimbatore, Tamilnadu,
An Implementation Of Network Traffic Classification Technique Based On K-Medoids
RESEARCH ARTICLE OPEN ACCESS An Implementation Of Network Traffic Classification Technique Based On K-Medoids Dheeraj Basant Shukla*, Gajendra Singh Chandel** *(Department of Information Technology, S.S.S.I.S.T,
Classification algorithm in Data mining: An Overview
Classification algorithm in Data mining: An Overview S.Neelamegam #1, Dr.E.Ramaraj *2 #1 M.phil Scholar, Department of Computer Science and Engineering, Alagappa University, Karaikudi. *2 Professor, Department
EXTENDING NETWORK SECURITY: TAKING A THREAT CENTRIC APPROACH TO SECURITY
EXTENDING NETWORK SECURITY: TAKING A THREAT CENTRIC APPROACH TO SECURITY Dean Frye Sourcefire Session ID: SEC-W05 Session Classification: Intermediate Industrialisation of Threat Factories Goal: Glory,
CYBER SCIENCE 2015 AN ANALYSIS OF NETWORK TRAFFIC CLASSIFICATION FOR BOTNET DETECTION
CYBER SCIENCE 2015 AN ANALYSIS OF NETWORK TRAFFIC CLASSIFICATION FOR BOTNET DETECTION MATIJA STEVANOVIC PhD Student JENS MYRUP PEDERSEN Associate Professor Department of Electronic Systems Aalborg University,
Prediction of DDoS Attack Scheme
Chapter 5 Prediction of DDoS Attack Scheme Distributed denial of service attack can be launched by malicious nodes participating in the attack, exploit the lack of entry point in a wireless network, and
Comparative Analysis of EM Clustering Algorithm and Density Based Clustering Algorithm Using WEKA tool.
International Journal of Engineering Research and Development e-issn: 2278-067X, p-issn: 2278-800X, www.ijerd.com Volume 9, Issue 8 (January 2014), PP. 19-24 Comparative Analysis of EM Clustering Algorithm
Identification of Network Applications based on Machine Learning Techniques
Identification of Network Applications based on Machine Learning Techniques Valentín Carela Español - [email protected] Pere Barlet Ros - [email protected] UPC Technical Report Deptartament d Arqutiectura
Data Quality Mining: Employing Classifiers for Assuring consistent Datasets
Data Quality Mining: Employing Classifiers for Assuring consistent Datasets Fabian Grüning Carl von Ossietzky Universität Oldenburg, Germany, [email protected] Abstract: Independent
A NEW DECISION TREE METHOD FOR DATA MINING IN MEDICINE
A NEW DECISION TREE METHOD FOR DATA MINING IN MEDICINE Kasra Madadipouya 1 1 Department of Computing and Science, Asia Pacific University of Technology & Innovation ABSTRACT Today, enormous amount of data
A Content based Spam Filtering Using Optical Back Propagation Technique
A Content based Spam Filtering Using Optical Back Propagation Technique Sarab M. Hameed 1, Noor Alhuda J. Mohammed 2 Department of Computer Science, College of Science, University of Baghdad - Iraq ABSTRACT
Introduction to Data Mining Techniques
Introduction to Data Mining Techniques Dr. Rajni Jain 1 Introduction The last decade has experienced a revolution in information availability and exchange via the internet. In the same spirit, more and
Part A OVERVIEW...1. 1. Introduction...1. 2. Applicability...2. 3. Legal Provision...2. Part B SOUND DATA MANAGEMENT AND MIS PRACTICES...
Part A OVERVIEW...1 1. Introduction...1 2. Applicability...2 3. Legal Provision...2 Part B SOUND DATA MANAGEMENT AND MIS PRACTICES...3 4. Guiding Principles...3 Part C IMPLEMENTATION...13 5. Implementation
Data Mining for Customer Service Support. Senioritis Seminar Presentation Megan Boice Jay Carter Nick Linke KC Tobin
Data Mining for Customer Service Support Senioritis Seminar Presentation Megan Boice Jay Carter Nick Linke KC Tobin Traditional Hotline Services Problem Traditional Customer Service Support (manufacturing)
A Frequency-Based Approach to Intrusion Detection
A Frequency-Based Approach to Intrusion Detection Mian Zhou and Sheau-Dong Lang School of Electrical Engineering & Computer Science and National Center for Forensic Science, University of Central Florida,
The Cyber Threat Profiler
Whitepaper The Cyber Threat Profiler Good Intelligence is essential to efficient system protection INTRODUCTION As the world becomes more dependent on cyber connectivity, the volume of cyber attacks are
BOOSTING - A METHOD FOR IMPROVING THE ACCURACY OF PREDICTIVE MODEL
The Fifth International Conference on e-learning (elearning-2014), 22-23 September 2014, Belgrade, Serbia BOOSTING - A METHOD FOR IMPROVING THE ACCURACY OF PREDICTIVE MODEL SNJEŽANA MILINKOVIĆ University
Service Description DDoS Mitigation Service
Service Description DDoS Mitigation Service Interoute, Walbrook Building, 195 Marsh Wall, London, E14 9SG, UK Tel: +800 4683 7681 Email: [email protected] Contents Contents 1 Introduction...3 2 An Overview...3
An Anomaly-Based Method for DDoS Attacks Detection using RBF Neural Networks
2011 International Conference on Network and Electronics Engineering IPCSIT vol.11 (2011) (2011) IACSIT Press, Singapore An Anomaly-Based Method for DDoS Attacks Detection using RBF Neural Networks Reyhaneh
Welcome. Data Mining: Updates in Technologies. Xindong Wu. Colorado School of Mines Golden, Colorado 80401, USA
Welcome Xindong Wu Data Mining: Updates in Technologies Dept of Math and Computer Science Colorado School of Mines Golden, Colorado 80401, USA Email: xwu@ mines.edu Home Page: http://kais.mines.edu/~xwu/
