An Implementation Of Network Traffic Classification Technique Based On K-Medoids
|
|
|
- Rosemary Parks
- 10 years ago
- Views:
Transcription
1 RESEARCH ARTICLE OPEN ACCESS An Implementation Of Network Traffic Classification Technique Based On K-Medoids Dheeraj Basant Shukla*, Gajendra Singh Chandel** *(Department of Information Technology, S.S.S.I.S.T, Bhopal, India) ** (Department of Information Technology, S.S.S.I.S.T, Bhopal, India) ABSTRACT Classification of network traffic is extensively required mainly for many network management tasks such as flow prioritization, traffic shaping/policing, and diagnostic monitoring. Many approaches have been evolved for this purpose. The classical approach such as port number or payload analysis methods has their own limitations. For example, some applications uses dynamic port number and encryption techniques, making these techniques ineffective. To overcome these limitations machine learning approaches were proposed. But these approaches also have problems of labeled instances in supervised learning and tedious manual work in unsupervised learning. Our aim was to implement an approach for classification of network traffic on semi-supervised data which overcomes the shortcomings of other two approaches. In this approach, flow (instance) statistics are used to classify the traffic. These flow statistics contains few labeled and many unlabeled instances constitutes a training data set which was used for the training (learning) of classifier. Then we used two processes: the clustering (using K-Medoids) which divides the training data into different groups and classification in which the labeling to the groups was done. To build the model we used the MATLAB tool. To test the build model we used KDD CUP 99 intrusion detection data set, which includes both attack data and normal data. Keyword - Classification, Clustering, Machine Learning, Semi-Supervised, K-Medoids. I. INTRODUCTION At present, the development of the TCP/IP technology based on Internet towards to a depth direction, such as the deployment of new generation infrastructure, the development of new technology; and the emergence of new application patterns and demands. Compared with the rapid development of the Internet, there is little research of network behaviors. Internet not only has the volatile, heterogeneity, dynamic, but also the strong society. The user behavior has an important effect on the Internet. So it is an interesting direction to understand such a system s statistical and dynamic property, and Internet users behavioral character. In addition, research of Internet and users behavior is an important step of many network management tasks [1]. Network Traffic Classification is the process of analyzing network traffic flows and classifies them mainly on the basis of protocols like TCP, UDP, IMAP, or POP3 etc or applications like games, messengers or news items etc. It is used to find out what types of application and protocols are run by end users [2,3]. Network traffic is a true reflection of the dynamics of network as it keeps track of all the activities of its user [1]. In this paper we will propose K-Medoids clustering algorithm for classification of network traffic using semi-supervised machine learning approach. The remainder of the paper is organized as follows. Section II outlines Literature Review. Section III describes Proposed Methodology. Section IV gives details of Dataset and Analysis Tool. Section V gives Performance Evaluation and Analysis. Finally Section V concluded this paper. II. LITERATURE REVIEW The At least three historical developments over the last two decades have rendered less accurate the traditional method of using transport-layer (TCP and UDP) ports to infer most Internet applications (port-based approach)[5]: Top The proliferation of new applications that have no IANA registered ports, but instead use ports already registered (to other applications), randomly selected, or user-defined The incentive for application designers and users to use well-known ports (assigned to other applications) to disguise their traffic and circumvent filtering or firewalls The inevitability of IPv4 address exhaustion, motivating pervasive deployment of network and port address translation, where, for example, several physical servers may offer services through the same public IP address but on different ports. At present, the main types of network application include HTTP, P2P, SMTP, POP3, Telnet, DNS, and 41 P a g e
2 FTP, etc. This section discusses the level of traffic analysis, and demonstrates which levels we are concerned about. Meanwhile, several techniques presented in the literature are surveyed; such as Port Number Mapping, Payload-based Analysis and Machine Learning. Current research of network traffic analysis mainly focuses on the bit-level, packet-level, flow-level and stream-level. Bit-Level s research mostly concern network traffic s quantitative characteristics, such as network cable transmission rate and throughput s changes. Packet- Level cares the arrival procedure of the IP packet, delay and packet loss rate. Ref. [6] studied the change of the backbone network at flow load, round-trip time, packet disorder ratio and delay. The basis of flow partition is the address and protocol. The traditional method relies on linking a well-known port number with a specific application, so as to identify different Internet traffic. The portbased method is successful because many wellknown applications have specific port numbers (assigned by IANA[7]). For example, HTTP traffic uses port 80; FTP port 21.But with the emergence of P2P application, the accuracy of port-based is declined sharply. Because such application tries to hide from firewalls and network security tools by using dynamic port numbers, or masquerading as HTTP or FTP applications. So the port-based method is no longer reliable. In order to deal with the disadvantages of the above method, a more reliable technique is to inspect the packet payload [8, 9]. In these methods, payloads are analyzed to determine whether or not they contain characteristic signatures of known applications. This technique can be extremely accurate when the payload is not encrypted. But this assumption is unrealistic because some P2P applications by use of different methods (encryption, variable-length padding), to avoid detecting by this technique. In addition, the demand of high process and storage capacity is discouraged, and privacy is concerned with examining user information [1]. Machine learning [10, 11], is one of the promising approach for traffic classification. There are two categories unsupervised and supervised in ML. The method in which the training data is labeled before is called as supervised learning. Labeled data means the input set for which the class to which it belong is known. The methodology in which the training data is unlabeled is called as unsupervised method. Unlabeled dataset is one for which class to which it belongs is unknown and is to be properly classified. Another machine learning category is Semisupervised methodology [12,13]. A learner and a classifier are two components of it. The learner is to distinguish a mapping between flows and traffic class from a training data set. Consequently, the classifier is obtained using this learned mapping. Fully labeled training data set is required to design the learner. It is very difficult as well as time consuming to obtain a fully labeled training data set. Quite the opposite, obtaining unlabeled training flows is reasonably priced. We build up and estimate a technique that allow us to design a traffic classifier using flow statistics using both labeled and unlabeled flows. Purposely, the learner is build using both labeled and unlabeled flows to show that unlabeled flow scan help to make the traffic classification problem handy. Semi-supervised approach is advantageous in the some situations. It is used to build fast and accurate classifier. This approach is vigorous and can lever formerly unseen flows. To improve the performance of the classifier it allows to add unlabeled flows. It classifies the given data set into appropriate classes using the k-means clustering algorithm [1, 4, 14, 15, 16]. III. PROPOSED METHODOLOGY Our proposed system is based on clustering and probabilistic assignment technique using semisupervised machine learning to analyze and classify network traffic on both labeled and unlabeled flow. Fig. 1 shows this proposed system, consisting of two major phases: Learning Phase and Classification Phase. In the learning phase, from training data set a mapping is determined between traffic flows and traffic class. Then, this mapping is used for classification in the next phase. Fig. 1. system architecture for proposed system 42 P a g e
3 3.1. Learning Phase This phase of proposed system consist of mainly three subphases as shown in fig. 1. Preprocessing and Transformation Clustering using K-Medoids Algorithm Class Label Assignment Preprocessing and Transformation Normalization is used for data preprocessing, where the attribute values are scaled so as to fall within a small specified range such as 0.0 to 1.0. In this work for normalization the attribute values are divided by the largest value for that attribute present in the dataset [17] Clustering The k-means algorithm is sensitive to outliers because an object with an extremely large value may substantially distort the distribution of data. This effect is particularly exacerbated due to the use of the square-error function. Instead of taking the mean value of the objects in a cluster as a reference point, we can pick actual objects to represent the clusters, using one representative object per cluster. Each remaining object is clustered with the representative object to which it is the most similar. The partitioning method is then performed based on the principle of minimizing the sum of the dissimilarities between each object and its corresponding reference point. PAM (Partitioning Around Medoids) was one of the first k-medoids algorithms introduced. It attempts to determine k partitions for n objects. After an initial random selection of k representative objects, the algorithm repeatedly tries to make a better choice of cluster representatives. All of the possible pairs of objects are analyzed, where one object in each pair is considered a representative object and the other is not. The quality of the resulting clustering is calculated for each such combination. An object, oj, is replaced with the object causing the greatest reduction in error. The set of best objects for each cluster in one iteration forms the representative objects for the next iteration. The final set of representative objects are the respective medoids of the clusters. The complexity of each iteration is O(k(n-k) 2 )[18]. Algorithm: PAM (Partitioning Around Medoids), a K-Medoids algorithm for partitioning based on central object. Input: k Number of clusters D A data set containing n objects Output: A set of k clusters Procedure: Step 1. Arbitrary choose k objects in D as the initial representative objects. Step 2. Assign each remaining object to cluster with the nearest representative object. Step 3. Randomly select a non-representative object, o random Step 4. Compute the total cost, S, of swapping representative object, o j, with o random. Step 5. If S < 0, then swap o j with o random to form the new set of k representative objects Step 6. Repeat Step 2 to Step 5 until there is no change in medoid Class Label Assignment Once training data is clustered available labeled flows i.e. clusters are mapped to different known classes. In this semi-supervised learning process, some clusters are mapped to different flow types. The collection of number of records are treated as input for classification process. The instance of a dataset is a record or a tuple (x,y), where attribute set is denoted by x and class attribute by y. A set of flows is suppose X = {X 1,..,X N }. Xi is a flow instance, which is a vector of attribute values, X i = {X ij 1 j m}, where m is the number of attributes, and X is the value of the j th attribute of the i th flow. The set of traffic classes are denoted by Y,Y ={Y 1,.,Y q }, where the number of classes are denoted by q. The Y i's can be classes. The mapping from m-dimensional variable X to Y forms a base for classification. The training is performed and the system is tested later on. The system is required to test on out of sample data. In the training phase center of the cluster is obtained. As well as in testing phase minimum distance of each record from centroid is compared, if found data is assigned to the same cluster. By using clustering algorithm number of clusters are determined. A mapping from clusters to labels is done using probabilistic assignment technique. P(Y = Y j C k ), where j = 1,,q. where q is number of class types and k = 1,.,K where K is the number of clusters. The set of flows which are labeled to different applications of training data are used to find out probabilities, (xi; yi), i =1,,L, where L = the total number of different labeled applications. P(Y = y j C k ) is then estimated by the maximum likelihood estimate, njk nk, where njk is the number of flows that were assigned to cluster k with label j, and nk is the total number of (labeled) flows that were assigned to cluster k[4] Classification Phase In this phase, the traffic data obtained from first phase will be given to classifier for classification. In addition to evaluate classifier the testing dataset has all labeled flows which is preprocessed and transformed before it is given as input to classifier. 43 P a g e
4 IV. DATASET AND ANALYSIS TOOL 4.1. KDD CUP 1999 Dataset The KDD CUP 99 dataset is used for The Third International Knowledge Discovery and Data Mining Tools Competition, which was held in conjunction with KDD-99. Dataset contains 41 features and 1 class label [19]. The raw training data was about four gigabytes of compressed binary TCP dump data from seven weeks of network traffic. This was processed into about five million connection records. Similarly, the two weeks of test data yielded around two million connection records. A connection is a sequence of TCP packets starting and ending at some welldefined times, between which data flows to and from a source IP address to a target IP address under some well-defined protocol. Every connection is labeled as either normal or as an attack, with exactly one specific attack type. Attacks fall into four main categories [19]: DoS: denial-of-service, e.g. synchronous flooding; R2L: unauthorized access from a remote machine, e.g. guessing password; U2R: unauthorized access to local super user (root) privileges, e.g., various ``buffer overflow'' attacks; Probing: supervision and snooping, e.g., port scanning MATLAB The name MATLAB stands for matrix laboratory. MATLAB is a high performance language for technical computing. It integrates computation, visualization, and programming in an easy-to-use environment where problems and solutions ar expressed in familiar mathematical notation [19]. V. PERFORMANCE EVALUATION The performance of classifier is greatly influenced by number of clusters. The number of clusters directly affects the quality of clustering, the time complexity. So, to evaluate performance of classifier the number of clusters has varied from 5 to 30. By this, we can determine at which number of cluster the classifier gives better performance. We have conducted two experiments. In first experiment, we have chosen LD1 and CD1 as learning and classification dataset respectively. In second experiment, we have chosen LD2 and CD2 as learning and classification dataset respectively. On basis of above two experiments, we evaluate the f- measure. To check effectiveness of classifier, we have calculated ratio of precision and recall represented with f-measure. The f-measure is defined as f-measure = 2* Precision * Recall Precision Recall 44 P a g e (1) Table 1 shows that precision of classifier calculated for individual class at number of clusters equals to 30 for LD1 and LD2 (i.e. in Experiment 1 and 2). Table 1. Precision of classifier at k=30 Precision (%) Attack Classes LD1 LD2 Normal Probe DoS U2R R2L Table 2 shows that recall of classifier calculated for individual class at number of clusters equals to 30 for LD1 and LD2 (i.e. in Expriment 1 and 2). Table 2. Recall of classifier at k=30 Recall (%) Attack Classes LD1 LD2 Normal Probe DoS U2R R2L Table 3 shows that f-measure of classifier calculated from precision and recall. Table 3. F-measure of classifier at k=30 Recall (%) Attack Classes LD1 LD2 Normal Probe DoS U2R R2L
5 F - Measure (%) Dheeraj Basant Shukla et al Int. Journal of Engineering Research and Applications NormalProbe DoS U2R R2L Types of Attack Classes LD1 LD2 Fig. 2. Graphical Representation of F-Measure The results shown in Table 3 and Fig. 2 indicates that the classifier correctly classifies the almost all instances belonging to class DoS and does not classify the other instances belonging to this class. Also there is no indication of new class detection. VI. CONCLUSION As an important character of network application, there is much literature about network traffic. In this work, from the micro perspective of network traffic, we described the use of semisupervised machine-learning to classify network traffic by application. The aim of the proposed system is to design and implement a semi supervised learning approach for network traffic classification based on clustering techniques. The system permits both labeled and unlabeled data to be used in training the network. The effectiveness of proposed approach has been evaluated by detailed experiments using different parameters. The experimental results has shown that the proposed technique fulfilled its said purpose and it is also possible to detect new classes during classification. It also significantly improves the accuracy and computational time. Experimental results shows that the performance of classifier can be improved by reducing the number of features in the dataset. In the future, this approach could become an excellent tool to classify network traffic. REFERENCES [1] Liu Yingqiu, Li Wei, Li Yunchun, Network Traffic Classification using K-Means Clustering, in Second International Multisymposium on Computer and Computational Sciences, Aug.2007, pp [2] Alberto Dainotti, Walter de Donato, Antonio Pescape, Pierluigi Salvo Rossi, Classification of Network Traffic via Packet Level Hidden Markov Models, in IEEE GLOBECOM, New Orleans, LO, Dec. 2008, pp [3] Geza Szabo, Istyan Szabo, Daniel Orincasy, Accurate Traffic Classification, in IEEE International Symposium on a World of Wireless Mobile and Multimedia Networks (WoWMoM),Espoo, Finland, June 2007, pp [4] Ms. Sheetal S. Shinde, Dr. Sandeep P. Abhang, A Network Traffic Clasification Technique using Clustering on Semi- Supervised Data, in International Journal of Electronics, Communication, & Soft Computing Sciences & Engineering, ISSN: ,Mar. 2012, pp [5] Alberto Dainotti, Antonio Pescape, Issues and Future Directions in Traffic Classification, in IEEE Network, Feb. 2012, pp [6] C. Fraleigh, S. Moon, B. Lyles, C. Cotton, M. Khan, D. Moll, et al. Packet-level traffic measurement from the sprint IP bacbone, in IEEE Trans. On Networks, 2003, 17(6): [7] IANA, Internet Assigned Numbers Authority, [8] C. Dews, A. Wichmann, A. Feldmann, An analysis of internet chat systems, In IMC 03, New York: ACM Press, 2003:51-64 [9] P. Haffner, S. Sen, O. Spatscheck, D. Wang, ACAS:Automated Construction of Application Signatures, SIGCOMM 05 MineNet Workshop, New York: ACM Press, 2005, PP [10] Erman, A. Mahanti, and M. Arlitt. "Internet Traffic Identification using Machine Learning". in Proc.GLOBECOM'06, San Francisco,USA, November [11] Sebastian Zander, Thuy Nguyen, Automated Traffic Classification and Application Identification using Machine Learning, Grenville Armitage Centre form Advanced Internet Architectures, Swinburne, University of Technology,Melbourne, Australia. [12] J. Erman, A. Mahanti, M. Arlitt, I. Cohen, and C. Williamson, Semi-Supervised Network Traffic Classification, SIGMETRICS'07, June 12.16, 2007, San Diego, California, USA. ACM /07/ P a g e
6 [13] J. Erman, A. Mahanti, M. Arlitt, I. Cohen, and C. Williamson, Offline/Online Traffic Classification Using Semi-Supervised Learning, Technical report, University of Calgary, [14] Williamson, Traffic Classification Using Clustering Algorithms, University of Calgary, SIGCOMM 06 Workshops, September 1115, 2006, Pisa, Italy. Copyright 2006 ACM /06/0009. [15] Munz, Sa Li, G. Carle, Traffic Anomaly Detection Using K-Means Clustering, Computer Networks and Internet, Wilhelm Schickard Institute for Computer Science,University of Tuebingen, Germany. [16] Amita Shrivastav Aruna Tiwari, Network Traffic Classification using Semi- Supervised Approach, Second International Conference on Machine Learning and Computing, 2010 IEEEDOI /ICMLC [17] Vinod Mahajan, Bupendra Verma, ""Implementation of Distance Based Semi Supervised Clustering and Probabilistic Assignment Technique for Network Traffic Classification." International Journal of Engineering Research and Applications, no. 2 (2012): [18] Jiawei Han, Micheline Kamber, Data Mining : Concepts and Techniques, Second Edition, MK Publishers,2006,pp [19] Vinod Mahajan, Bupendra Verma, "Implementation of network traffic classifier using semi supervised machine learning approach, Nirma University International Conference on Engineering (NUiCONE), 2012, pp.1,6, 6-8 Dec P a g e
CLASSIFYING NETWORK TRAFFIC IN THE BIG DATA ERA
CLASSIFYING NETWORK TRAFFIC IN THE BIG DATA ERA Professor Yang Xiang Network Security and Computing Laboratory (NSCLab) School of Information Technology Deakin University, Melbourne, Australia http://anss.org.au/nsclab
Encrypted Internet Traffic Classification Method based on Host Behavior
Encrypted Internet Traffic Classification Method based on Host Behavior 1,* Chengjie GU, 1 Shunyi ZHANG, 2 Xiaozhen XUE 1 Institute of Information Network Technology, Nanjing University of Posts and Telecommunications,
Traffic Classification with Sampled NetFlow
Traffic Classification with Sampled NetFlow Valentín Carela-Español, Pere Barlet-Ros, Josep Solé-Pareta Universitat Politècnica de Catalunya (UPC) {vcarela,pbarlet,pareta}@ac.upc.edu Abstract The traffic
How To Classify Network Traffic In Real Time
22 Approaching Real-time Network Traffic Classification ISSN 1470-5559 Wei Li, Kaysar Abdin, Robert Dann and Andrew Moore RR-06-12 October 2006 Department of Computer Science Approaching Real-time Network
A Review of Anomaly Detection Techniques in Network Intrusion Detection System
A Review of Anomaly Detection Techniques in Network Intrusion Detection System Dr.D.V.S.S.Subrahmanyam Professor, Dept. of CSE, Sreyas Institute of Engineering & Technology, Hyderabad, India ABSTRACT:In
An analysis of suitable parameters for efficiently applying K-means clustering to large TCPdump data set using Hadoop framework
An analysis of suitable parameters for efficiently applying K-means clustering to large TCPdump data set using Hadoop framework Jakrarin Therdphapiyanak Dept. of Computer Engineering Chulalongkorn University
Near Real Time Online Flow-based Internet Traffic Classification Using Machine Learning (C4.5)
Near Real Time Online Flow-based Internet Traffic Classification Using Machine Learning (C4.5) Abuagla Babiker Mohammed Faculty of Electrical Engineering (FKE) Deprtment of Microelectronics and Computer
How is SUNET really used?
MonNet a project for network and traffic monitoring How is SUNET really used? Results of traffic classification on backbone data Wolfgang John and Sven Tafvelin Dept. of Computer Science and Engineering
A Survey on Intrusion Detection System with Data Mining Techniques
A Survey on Intrusion Detection System with Data Mining Techniques Ms. Ruth D 1, Mrs. Lovelin Ponn Felciah M 2 1 M.Phil Scholar, Department of Computer Science, Bishop Heber College (Autonomous), Trichirappalli,
Detection. Perspective. Network Anomaly. Bhattacharyya. Jugal. A Machine Learning »C) Dhruba Kumar. Kumar KaKta. CRC Press J Taylor & Francis Croup
Network Anomaly Detection A Machine Learning Perspective Dhruba Kumar Bhattacharyya Jugal Kumar KaKta»C) CRC Press J Taylor & Francis Croup Boca Raton London New York CRC Press is an imprint of the Taylor
HYBRID INTRUSION DETECTION FOR CLUSTER BASED WIRELESS SENSOR NETWORK
HYBRID INTRUSION DETECTION FOR CLUSTER BASED WIRELESS SENSOR NETWORK 1 K.RANJITH SINGH 1 Dept. of Computer Science, Periyar University, TamilNadu, India 2 T.HEMA 2 Dept. of Computer Science, Periyar University,
Signature-aware Traffic Monitoring with IPFIX 1
Signature-aware Traffic Monitoring with IPFIX 1 Youngseok Lee, Seongho Shin, and Taeck-geun Kwon Dept. of Computer Engineering, Chungnam National University, 220 Gungdong Yusonggu, Daejon, Korea, 305-764
Network Intrusion Detection Systems
Network Intrusion Detection Systems False Positive Reduction Through Anomaly Detection Joint research by Emmanuele Zambon & Damiano Bolzoni 7/1/06 NIDS - False Positive reduction through Anomaly Detection
An Efficient Way of Denial of Service Attack Detection Based on Triangle Map Generation
An Efficient Way of Denial of Service Attack Detection Based on Triangle Map Generation Shanofer. S Master of Engineering, Department of Computer Science and Engineering, Veerammal Engineering College,
A Novel Approach for Network Traffic Summarization
A Novel Approach for Network Traffic Summarization Mohiuddin Ahmed, Abdun Naser Mahmood, Michael J. Maher School of Engineering and Information Technology, UNSW Canberra, ACT 2600, Australia, [email protected],[email protected],M.Maher@unsw.
Data Mining Project Report. Document Clustering. Meryem Uzun-Per
Data Mining Project Report Document Clustering Meryem Uzun-Per 504112506 Table of Content Table of Content... 2 1. Project Definition... 3 2. Literature Survey... 3 3. Methods... 4 3.1. K-means algorithm...
Comparison of K-means and Backpropagation Data Mining Algorithms
Comparison of K-means and Backpropagation Data Mining Algorithms Nitu Mathuriya, Dr. Ashish Bansal Abstract Data mining has got more and more mature as a field of basic research in computer science and
Identifying Peer-to-Peer Traffic Based on Traffic Characteristics
Identifying Peer-to-Peer Traffic Based on Traffic Characteristics Prof S. R. Patil Dept. of Computer Engineering SIT, Savitribai Phule Pune University Lonavala, India [email protected] Suraj Sanjay Dangat
An Overview of Knowledge Discovery Database and Data mining Techniques
An Overview of Knowledge Discovery Database and Data mining Techniques Priyadharsini.C 1, Dr. Antony Selvadoss Thanamani 2 M.Phil, Department of Computer Science, NGM College, Pollachi, Coimbatore, Tamilnadu,
Firewall Firewall August, 2003
Firewall August, 2003 1 Firewall and Access Control This product also serves as an Internet firewall, not only does it provide a natural firewall function (Network Address Translation, NAT), but it also
The Applications of Deep Learning on Traffic Identification
The Applications of Deep Learning on Traffic Identification Zhanyi Wang [email protected] Abstract Generally speaking, most systems of network traffic identification are based on features. The features
Hadoop Technology for Flow Analysis of the Internet Traffic
Hadoop Technology for Flow Analysis of the Internet Traffic Rakshitha Kiran P PG Scholar, Dept. of C.S, Shree Devi Institute of Technology, Mangalore, Karnataka, India ABSTRACT: Flow analysis of the internet
Bisecting K-Means for Clustering Web Log data
Bisecting K-Means for Clustering Web Log data Ruchika R. Patil Department of Computer Technology YCCE Nagpur, India Amreen Khan Department of Computer Technology YCCE Nagpur, India ABSTRACT Web usage mining
Development of a Network Intrusion Detection System
Development of a Network Intrusion Detection System (I): Agent-based Design (FLC1) (ii): Detection Algorithm (FLC2) Supervisor: Dr. Korris Chung Please visit my personal homepage www.comp.polyu.edu.hk/~cskchung/fyp04-05/
Adaptive Anomaly Detection for Network Security
International Journal of Computer and Internet Security. ISSN 0974-2247 Volume 5, Number 1 (2013), pp. 1-9 International Research Publication House http://www.irphouse.com Adaptive Anomaly Detection for
Network Intrusion Detection using Semi Supervised Support Vector Machine
Network Intrusion Detection using Semi Supervised Support Vector Machine Jyoti Haweliya Department of Computer Engineering Institute of Engineering & Technology, Devi Ahilya University Indore, India ABSTRACT
Forensic Network Traffic Analysis
Forensic Network Traffic Analysis Noora Al Khater Department of Informatics King's College London London, United Kingdom [email protected] Richard E Overill Department of Informatics King's College
International Journal of Innovative Research in Advanced Engineering (IJIRAE) ISSN: 2349-2163 Volume 1 Issue 11 (November 2014)
Denial-of-Service Attack Detection Mangesh D. Salunke * Prof. Ruhi Kabra G.H.Raisoni CEM, SPPU, Ahmednagar HOD, G.H.Raisoni CEM, SPPU,Ahmednagar Abstract: A DoS (Denial of Service) attack as name indicates
Robust Network Traffic Classification
IEEE/ACM TRANSACTIONS ON NETWORKING 1 Robust Network Traffic Classification Jun Zhang, Member, IEEE, XiaoChen, Student Member, IEEE, YangXiang, Senior Member, IEEE, Wanlei Zhou, Senior Member, IEEE, and
Social Media Mining. Data Mining Essentials
Introduction Data production rate has been increased dramatically (Big Data) and we are able store much more data than before E.g., purchase data, social media data, mobile phone data Businesses and customers
Analysis of Network Packets. C DAC Bangalore Electronics City
Analysis of Network Packets C DAC Bangalore Electronics City Agenda TCP/IP Protocol Security concerns related to Protocols Packet Analysis Signature based Analysis Anomaly based Analysis Traffic Analysis
Grid Density Clustering Algorithm
Grid Density Clustering Algorithm Amandeep Kaur Mann 1, Navneet Kaur 2, Scholar, M.Tech (CSE), RIMT, Mandi Gobindgarh, Punjab, India 1 Assistant Professor (CSE), RIMT, Mandi Gobindgarh, Punjab, India 2
Security vulnerabilities in the Internet and possible solutions
Security vulnerabilities in the Internet and possible solutions 1. Introduction The foundation of today's Internet is the TCP/IP protocol suite. Since the time when these specifications were finished in
A survey on Data Mining based Intrusion Detection Systems
International Journal of Computer Networks and Communications Security VOL. 2, NO. 12, DECEMBER 2014, 485 490 Available online at: www.ijcncs.org ISSN 2308-9830 A survey on Data Mining based Intrusion
Clustering on Large Numeric Data Sets Using Hierarchical Approach Birch
Global Journal of Computer Science and Technology Software & Data Engineering Volume 12 Issue 12 Version 1.0 Year 2012 Type: Double Blind Peer Reviewed International Research Journal Publisher: Global
Large-Scale TCP Packet Flow Analysis for Common Protocols Using Apache Hadoop
Large-Scale TCP Packet Flow Analysis for Common Protocols Using Apache Hadoop R. David Idol Department of Computer Science University of North Carolina at Chapel Hill [email protected] http://www.cs.unc.edu/~mxrider
A Review on Network Intrusion Detection System Using Open Source Snort
, pp.61-70 http://dx.doi.org/10.14257/ijdta.2016.9.4.05 A Review on Network Intrusion Detection System Using Open Source Snort Sakshi Sharma and Manish Dixit Department of CSE& IT MITS Gwalior, India [email protected],
An apparatus for P2P classification in Netflow traces
An apparatus for P2P classification in Netflow traces Andrew M Gossett, Ioannis Papapanagiotou and Michael Devetsikiotis Electrical and Computer Engineering, North Carolina State University, Raleigh, USA
Robust Outlier Detection Technique in Data Mining: A Univariate Approach
Robust Outlier Detection Technique in Data Mining: A Univariate Approach Singh Vijendra and Pathak Shivani Faculty of Engineering and Technology Mody Institute of Technology and Science Lakshmangarh, Sikar,
Sage ERP Accpac Online
Sage ERP Accpac Online Mac Resource Guide Thank you for choosing Sage ERP Accpac Online. This Resource Guide will provide important information and instructions on how you can get started using your Mac
Sage 300 ERP Online. Mac Resource Guide. (Formerly Sage ERP Accpac Online) Updated June 1, 2012. Page 1
Sage 300 ERP Online (Formerly Sage ERP Accpac Online) Mac Resource Guide Updated June 1, 2012 Page 1 Table of Contents 1.0 Introduction... 3 2.0 Getting Started with Sage 300 ERP Online using a Mac....
NETWORK INTRUSION DETECTION SYSTEM USING HYBRID CLASSIFICATION MODEL
NETWORK INTRUSION DETECTION SYSTEM USING HYBRID CLASSIFICATION MODEL Prof. Santosh T. Waghmode 1, Prof. Vinod S. Wadne 2 Department of Computer Engineering, 1, 2 JSPM s Imperial College of Engineering
A new Approach for Intrusion Detection in Computer Networks Using Data Mining Technique
A new Approach for Intrusion Detection in Computer Networks Using Data Mining Technique Aida Parbaleh 1, Dr. Heirsh Soltanpanah 2* 1 Department of Computer Engineering, Islamic Azad University, Sanandaj
Cover. White Paper. (nchronos 4.1)
Cover White Paper (nchronos 4.1) Copyright Copyright 2013 Colasoft LLC. All rights reserved. Information in this document is subject to change without notice. No part of this document may be reproduced
International Journal of Computer Science Trends and Technology (IJCST) Volume 2 Issue 3, May-Jun 2014
RESEARCH ARTICLE OPEN ACCESS A Survey of Data Mining: Concepts with Applications and its Future Scope Dr. Zubair Khan 1, Ashish Kumar 2, Sunny Kumar 3 M.Tech Research Scholar 2. Department of Computer
Classification of Firewalls and Proxies
Classification of Firewalls and Proxies By Dhiraj Bhagchandka Advisor: Mohamed G. Gouda ([email protected]) Department of Computer Sciences The University of Texas at Austin Computer Science Research
A Preliminary Performance Comparison of Two Feature Sets for Encrypted Traffic Classification
A Preliminary Performance Comparison of Two Feature Sets for Encrypted Traffic Classification Riyad Alshammari and A. Nur Zincir-Heywood Dalhousie University, Faculty of Computer Science {riyad, zincir}@cs.dal.ca
Comparison and Analysis of Various Clustering Methods in Data mining On Education data set Using the weak tool
Comparison and Analysis of Various Clustering Metho in Data mining On Education data set Using the weak tool Abstract:- Data mining is used to find the hidden information pattern and relationship between
Internet Traffic Measurement
Internet Traffic Measurement Internet Traffic Measurement Network Monitor Placement Measurement Analysis Tools Measurement Result Reporting Probing Mechanism Vantage Points Edge vs Core Hardware vs Software
Using Data Mining for Mobile Communication Clustering and Characterization
Using Data Mining for Mobile Communication Clustering and Characterization A. Bascacov *, C. Cernazanu ** and M. Marcu ** * Lasting Software, Timisoara, Romania ** Politehnica University of Timisoara/Computer
Realtime Classification for Encrypted Traffic
Realtime Classification for Encrypted Traffic Roni Bar-Yanai 1, Michael Langberg 2,, David Peleg 3,, and Liam Roditty 4 1 Cisco, Netanya, Israel [email protected] 2 Computer Science Division, Open University
Layered Approach of Intrusion Detection System with Efficient Alert Aggregation for Heterogeneous Networks
Layered Approach of Intrusion Detection System with Efficient Alert Aggregation for Heterogeneous Networks Lohith Raj S N, Shanthi M B, Jitendranath Mungara Abstract Protecting data from the intruders
How To Identify A Network Protocol From A Port Number
Proceedings of the 2008 IEEE Systems and Information Engineering Design Symposium, University of Virginia, Charlottesville, VA, USA, April 25, 2008 FAMSim,DM.3 A Statistical Approach to TCP Session Classification
Network Concepts. IT 4823 Information Security Concepts and Administration. The Network Environment. Resilience. Network Topology. Transmission Media
IT 4823 Information Security Concepts and Administration March 17 Network Threats Notice: This session is being recorded. Happy 50 th, Vanguard II March 17, 1958 R.I.P. John Backus March 17, 2007 Copyright
A Novel Distributed Denial of Service (DDoS) Attacks Discriminating Detection in Flash Crowds
International Journal of Research Studies in Science, Engineering and Technology Volume 1, Issue 9, December 2014, PP 139-143 ISSN 2349-4751 (Print) & ISSN 2349-476X (Online) A Novel Distributed Denial
Bandwidth based Distributed Denial of Service Attack Detection using Artificial Immune System
Bandwidth based Distributed Denial of Service Attack Detection using Artificial Immune System 1 M.Yasodha, 2 S. Umarani 1 PG Scholar, Department of Information Technology, Maharaja Engineering College,
How To Prevent Network Attacks
Ali A. Ghorbani Wei Lu Mahbod Tavallaee Network Intrusion Detection and Prevention Concepts and Techniques )Spri inger Contents 1 Network Attacks 1 1.1 Attack Taxonomies 2 1.2 Probes 4 1.2.1 IPSweep and
A SYSTEM FOR DENIAL OF SERVICE ATTACK DETECTION BASED ON MULTIVARIATE CORRELATION ANALYSIS
Journal homepage: www.mjret.in ISSN:2348-6953 A SYSTEM FOR DENIAL OF SERVICE ATTACK DETECTION BASED ON MULTIVARIATE CORRELATION ANALYSIS P.V.Sawant 1, M.P.Sable 2, P.V.Kore 3, S.R.Bhosale 4 Department
MONITORING OF TRAFFIC OVER THE VICTIM UNDER TCP SYN FLOOD IN A LAN
MONITORING OF TRAFFIC OVER THE VICTIM UNDER TCP SYN FLOOD IN A LAN Kanika 1, Renuka Goyal 2, Gurmeet Kaur 3 1 M.Tech Scholar, Computer Science and Technology, Central University of Punjab, Punjab, India
Impact of Feature Selection on the Performance of Wireless Intrusion Detection Systems
2009 International Conference on Computer Engineering and Applications IPCSIT vol.2 (2011) (2011) IACSIT Press, Singapore Impact of Feature Selection on the Performance of ireless Intrusion Detection Systems
Early Recognition of Encrypted Applications
Early Recognition of Encrypted Applications Laurent Bernaille with Renata Teixeira Laboratoire LIP6 CNRS Université Pierre et Marie Curie Paris 6 Can we find the application inside an SSL connection? Network
Efficient Security Alert Management System
Efficient Security Alert Management System Minoo Deljavan Anvary IT Department School of e-learning Shiraz University Shiraz, Fars, Iran Majid Ghonji Feshki Department of Computer Science Qzvin Branch,
Behaviour Based Worm Detection and Signature Automation
Journal of Computer Science 7 (11): 1724-1728, 2011 ISSN 1549-3636 2011 Science Publications Behaviour Based Worm Detection and Signature Automation 1 Mohammed Anbar, 1 Selvakumar Manickam, 2 Al-Samarraie
Standardization and Its Effects on K-Means Clustering Algorithm
Research Journal of Applied Sciences, Engineering and Technology 6(7): 399-3303, 03 ISSN: 040-7459; e-issn: 040-7467 Maxwell Scientific Organization, 03 Submitted: January 3, 03 Accepted: February 5, 03
Virtual private network. Network security protocols VPN VPN. Instead of a dedicated data link Packets securely sent over a shared network Internet VPN
Virtual private network Network security protocols COMP347 2006 Len Hamey Instead of a dedicated data link Packets securely sent over a shared network Internet VPN Public internet Security protocol encrypts
Trends and Differences in Connection-behavior within Classes of Internet Backbone Traffic
MonNet a project for network and traffic monitoring Trends and Differences in Connection-behavior within Classes of Internet Backbone Traffic Wolfgang John, Sven Tafvelin and Tomas Olovsson Department
USING LOCAL NETWORK AUDIT SENSORS AS DATA SOURCES FOR INTRUSION DETECTION. Integrated Information Systems Group, Ruhr University Bochum, Germany
USING LOCAL NETWORK AUDIT SENSORS AS DATA SOURCES FOR INTRUSION DETECTION Daniel Hamburg,1 York Tüchelmann Integrated Information Systems Group, Ruhr University Bochum, Germany Abstract: The increase of
Second-generation (GenII) honeypots
Second-generation (GenII) honeypots Bojan Zdrnja CompSci 725, University of Auckland, Oct 2004. [email protected] Abstract Honeypots are security resources which trap malicious activities, so they
Comparision of k-means and k-medoids Clustering Algorithms for Big Data Using MapReduce Techniques
Comparision of k-means and k-medoids Clustering Algorithms for Big Data Using MapReduce Techniques Subhashree K 1, Prakash P S 2 1 Student, Kongu Engineering College, Perundurai, Erode 2 Assistant Professor,
An Analysis on Density Based Clustering of Multi Dimensional Spatial Data
An Analysis on Density Based Clustering of Multi Dimensional Spatial Data K. Mumtaz 1 Assistant Professor, Department of MCA Vivekanandha Institute of Information and Management Studies, Tiruchengode,
An Empirical Study of Application of Data Mining Techniques in Library System
An Empirical Study of Application of Data Mining Techniques in Library System Veepu Uppal Department of Computer Science and Engineering, Manav Rachna College of Engineering, Faridabad, India Gunjan Chindwani
Predicting the Risk of Heart Attacks using Neural Network and Decision Tree
Predicting the Risk of Heart Attacks using Neural Network and Decision Tree S.Florence 1, N.G.Bhuvaneswari Amma 2, G.Annapoorani 3, K.Malathi 4 PG Scholar, Indian Institute of Information Technology, Srirangam,
Advanced Computer Networks IN2097. 1 Dec 2015
Chair for Network Architectures and Services Technische Universität München Advanced Computer Networks IN2097 1 Dec 2015 Prof. Dr.-Ing. Georg Carle Chair for Network Architectures and Services Department
WEB APPLICATION FIREWALL
WEB APPLICATION FIREWALL CS499 : B.Tech Project Final Report by Namit Gupta (Y3188) Abakash Saikia (Y3349) under the supervision of Dr. Dheeraj Sanghi submitted to Department of Computer Science and Engineering
Two State Intrusion Detection System Against DDos Attack in Wireless Network
Two State Intrusion Detection System Against DDos Attack in Wireless Network 1 Pintu Vasani, 2 Parikh Dhaval 1 M.E Student, 2 Head of Department (LDCE-CSE) L.D. College of Engineering, Ahmedabad, India.
Adaptive Network Intrusion Detection System using a Hybrid Approach
Adaptive Network Intrusion Detection System using a Hybrid Approach R Rangadurai Karthick Department of Computer Science and Engineering IIT Madras, India [email protected] Vipul P. Hattiwale Department
A Content based Spam Filtering Using Optical Back Propagation Technique
A Content based Spam Filtering Using Optical Back Propagation Technique Sarab M. Hameed 1, Noor Alhuda J. Mohammed 2 Department of Computer Science, College of Science, University of Baghdad - Iraq ABSTRACT
Online Classification of Network Flows
2009 Seventh Annual Communications Networks and Services Research Conference Online Classification of Network Flows Mahbod Tavallaee, Wei Lu and Ali A. Ghorbani Faculty of Computer Science, University
Network Based Intrusion Detection Using Honey pot Deception
Network Based Intrusion Detection Using Honey pot Deception Dr.K.V.Kulhalli, S.R.Khot Department of Electronics and Communication Engineering D.Y.Patil College of Engg.& technology, Kolhapur,Maharashtra,India.
CS5008: Internet Computing
CS5008: Internet Computing Lecture 22: Internet Security A. O Riordan, 2009, latest revision 2015 Internet Security When a computer connects to the Internet and begins communicating with others, it is
Improving the Performance of TCP Using Window Adjustment Procedure and Bandwidth Estimation
Improving the Performance of TCP Using Window Adjustment Procedure and Bandwidth Estimation R.Navaneethakrishnan Assistant Professor (SG) Bharathiyar College of Engineering and Technology, Karaikal, India.
STOCK MARKET TRENDS USING CLUSTER ANALYSIS AND ARIMA MODEL
Stock Asian-African Market Trends Journal using of Economics Cluster Analysis and Econometrics, and ARIMA Model Vol. 13, No. 2, 2013: 303-308 303 STOCK MARKET TRENDS USING CLUSTER ANALYSIS AND ARIMA MODEL
Traffic Anomaly Detection Using K-Means Clustering
Traffic Anomaly Detection Using K-Means Clustering Gerhard Münz, Sa Li, Georg Carle Computer Networks and Internet Wilhelm Schickard Institute for Computer Science University of Tuebingen, Germany Abstract
Virtual Server and DDNS. Virtual Server and DDNS. For BIPAC 741/743GE
Virtual Server and DDNS For BIPAC 741/743GE August, 2003 1 Port Number In TCP/IP and UDP networks, a port is a 16-bit number, used by the host-to-host protocol to identify to which application program
TCP Traffic Classification Using Markov Models
TCP Traffic Classification Using Markov Models Gerhard Münz 1, Hui Dai 2, Lothar Braun 1, Georg Carle 1 Network Architectures and Services Institute for Informatics Technische Universität München, Germany
Network Traffic Classification and Demand Prediction
Chapter 12 Network Traffic Classification and Demand Prediction Mikhail Dashevskiy and Zhiyuan Luo Reliable classification of network traffic and accurate demand prediction can offer substantial benefits
Analysis of Communication Patterns in Network Flows to Discover Application Intent
Analysis of Communication Patterns in Network Flows to Discover Application Intent Presented by: William H. Turkett, Jr. Department of Computer Science FloCon 2013 January 9, 2013 Port- and payload signature-based
KEITH LEHNERT AND ERIC FRIEDRICH
MACHINE LEARNING CLASSIFICATION OF MALICIOUS NETWORK TRAFFIC KEITH LEHNERT AND ERIC FRIEDRICH 1. Introduction 1.1. Intrusion Detection Systems. In our society, information systems are everywhere. They
Fig. 4.2.1: Packet Filtering
4.2 Types of Firewalls /DKo98/ FIREWALL CHARACTERISTICS 1. All traffic from inside to outside, and vice versa, must pass through the firewall. This is achieved by physically blocking all access to the
Conclusions and Future Directions
Chapter 9 This chapter summarizes the thesis with discussion of (a) the findings and the contributions to the state-of-the-art in the disciplines covered by this work, and (b) future work, those directions
Traffic Analysis of Mobile Broadband Networks
Traffic Analysis of Mobile Broadband Networks Geza Szabo,Daniel Orincsay,Balazs Peter Gero,Sandor Gyori,Tamas Borsos TrafficLab, Ericsson Research, Budapest, Hungary Email:{geza.szabo,daniel.orincsay,
