Identifying Novelty in Network Traffic

被引:0
|
作者
Sylvester, Joshua [1 ]
de Lemos, Rogerio [1 ]
机构
[1] Univ Kent, Sch Comp, Canterbury, Kent, England
关键词
D O I
10.1109/CSR61664.2024.10679382
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In a typical Security Operations Centre (SOC), detection methods for malicious transactions are usually resource-intensive, requiring a large team to monitor traffic, which is not ideal for efficient and effective decisions. This paper presents the MAE-NAE FRAMEWORK, consisting of two autoencoders and an adjudicator, which is fast and accurate, but not resource-intensive. One autoencoder is trained on malicious data, while the other is trained on normal data. The adjudicator classifies transactions into malicious, normal or novel, depending on the confidence level. Although autoencoders are widely used for novelty detection, they have not been used to identify novelty in network traffic, which is the key goal of MAE-NAE FRAMEWORK. This allows the provision of a triage system that identifies transactions as novel for which the confidence level in classifying either normal or malicious is low. For evaluating the MAE-NAE FRAMEWORK, we have used the KDDCUP99 benchmark dataset with a simple linear adjudicator. The MAE-NAE FRAMEWORK can classify 94.73% of data as normal or malicious leaving 5.27% of the transactions as novel. We have compared our solution against various solutions within the literature, and the MAE-NAE FRAMEWORK is more effective in classifying transactions.
引用
收藏
页码:506 / 511
页数:6
相关论文
共 50 条
  • [1] Identifying Behavioral Novelty
    Brown R.L.
    Biological Theory, 2014, 9 (2) : 135 - 148
  • [2] A PROCEDURE FOR IDENTIFYING NEEDED IMPROVEMENTS IN A TRAFFIC NETWORK
    BHESANIA, RP
    ITE JOURNAL-INSTITUTE OF TRANSPORTATION ENGINEERS, 1988, 58 (11): : 21 - 26
  • [3] Identifying and Differentiating Acknowledged Scanners in Network Traffic
    Collins, M. Patrick
    Hussain, Alefiya
    Schwab, Stephen
    2023 IEEE EUROPEAN SYMPOSIUM ON SECURITY AND PRIVACY WORKSHOPS, EUROS&PW, 2023, : 567 - 574
  • [4] Identifying infected users via network traffic
    Gratian, Margaret
    Bhansali, Darshan
    Cukier, Michel
    Dykstra, Josiah
    COMPUTERS & SECURITY, 2019, 80 : 306 - 316
  • [5] Identifying Mobile Applications for Encrypted Network Traffic
    He, Gaofeng
    Xu, Bingfeng
    Zhu, Haiting
    2017 FIFTH INTERNATIONAL CONFERENCE ON ADVANCED CLOUD AND BIG DATA (CBD), 2017, : 279 - 284
  • [6] Novelty Detection in Network Traffic: Using Survival Analysis for Feature Identification
    Bradley, Taylor
    Alhajjar, Elie
    Bastian, Nathaniel D.
    2023 IEEE INTERNATIONAL CONFERENCE ON ASSURED AUTONOMY, ICAA, 2023, : 11 - 18
  • [7] Profiling and Identifying Users' Activities With Network Traffic Analysis
    Tao, Ma
    Ming, Ye Chun
    Juan, Chen
    PROCEEDINGS OF 2015 6TH IEEE INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING AND SERVICE SCIENCE, 2015, : 503 - 506
  • [8] Identifying Traffic Congestion Patterns of Urban Road Network Based on Traffic Performance Index
    Zang, Jinrui
    Jiao, Pengpeng
    Liu, Sining
    Zhang, Xi
    Song, Guohua
    Yu, Lei
    SUSTAINABILITY, 2023, 15 (02)
  • [9] Identifying Tunnelled Proxies through Passively Monitoring Network Traffic
    Janbeglou, Maziar
    Brownlee, Nevil
    PROCEEDINGS OF 2016 IEEE 18TH INTERNATIONAL CONFERENCE ON HIGH PERFORMANCE COMPUTING AND COMMUNICATIONS; IEEE 14TH INTERNATIONAL CONFERENCE ON SMART CITY; IEEE 2ND INTERNATIONAL CONFERENCE ON DATA SCIENCE AND SYSTEMS (HPCC/SMARTCITY/DSS), 2016, : 63 - 69
  • [10] Identifying Network Traffic Features Suitable for Honeynet Data Analysis
    Sqalli, Mohammed H.
    Firdous, Syed Naeem
    Salah, Khaled
    Abu-Amara, Marwan
    2011 24TH CANADIAN CONFERENCE ON ELECTRICAL AND COMPUTER ENGINEERING (CCECE), 2011, : 1044 - 1048