Identifying Novelty in Network Traffic

被引:0
|
作者
Sylvester, Joshua [1 ]
de Lemos, Rogerio [1 ]
机构
[1] Univ Kent, Sch Comp, Canterbury, Kent, England
关键词
D O I
10.1109/CSR61664.2024.10679382
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In a typical Security Operations Centre (SOC), detection methods for malicious transactions are usually resource-intensive, requiring a large team to monitor traffic, which is not ideal for efficient and effective decisions. This paper presents the MAE-NAE FRAMEWORK, consisting of two autoencoders and an adjudicator, which is fast and accurate, but not resource-intensive. One autoencoder is trained on malicious data, while the other is trained on normal data. The adjudicator classifies transactions into malicious, normal or novel, depending on the confidence level. Although autoencoders are widely used for novelty detection, they have not been used to identify novelty in network traffic, which is the key goal of MAE-NAE FRAMEWORK. This allows the provision of a triage system that identifies transactions as novel for which the confidence level in classifying either normal or malicious is low. For evaluating the MAE-NAE FRAMEWORK, we have used the KDDCUP99 benchmark dataset with a simple linear adjudicator. The MAE-NAE FRAMEWORK can classify 94.73% of data as normal or malicious leaving 5.27% of the transactions as novel. We have compared our solution against various solutions within the literature, and the MAE-NAE FRAMEWORK is more effective in classifying transactions.
引用
收藏
页码:506 / 511
页数:6
相关论文
共 50 条
  • [31] METHOD FOR IDENTIFYING MOTOR VEHICLE TRAFFIC VIOLATIONS BASED ON IMPROVED YOLOV NETWORK
    Hao, Zhengjun
    SCALABLE COMPUTING-PRACTICE AND EXPERIENCE, 2023, 24 (03): : 217 - 228
  • [32] Identifying IoT Devices Based on Spatial and Temporal Features from Network Traffic
    Yin F.
    Yang L.
    Ma J.
    Zhou Y.
    Wang Y.
    Dai J.
    Security and Communication Networks, 2021, 2021
  • [33] Novelty Detection for Identifying Deterioration in Emergency Department Patients
    Clifton, David A.
    Wong, David
    Fleming, Susannah
    Wilson, Sarah J.
    Way, Rob
    Pullinger, Richard
    Tarassenko, Lionel
    INTELLIGENT DATA ENGINEERING AND AUTOMATED LEARNING - IDEAL 2011, 2011, 6936 : 220 - +
  • [34] Identifying LDoS attack traffic based on wavelet energy spectrum and combined neural network
    Yue, Meng
    Liu, Liang
    Wu, Zhijun
    Wang, Minxiao
    INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2018, 31 (02)
  • [35] Identifying High-Cardinality Hosts from Network-wide Traffic Measurements
    Liu, Yang
    Chen, Wenji
    Guan, Yong
    2013 IEEE CONFERENCE ON COMMUNICATIONS AND NETWORK SECURITY (CNS), 2013, : 287 - 295
  • [36] Identifying DDoS Attacks from Fluctuations in Wireless Traffic in an Intelligent IoT Road Network
    Skoufas, Konstantinos
    Spyrou, Evangelos D.
    Mitrakos, Dimitris
    2020 16TH INTERNATIONAL WIRELESS COMMUNICATIONS & MOBILE COMPUTING CONFERENCE, IWCMC, 2020, : 451 - 456
  • [37] Identifying High-Cardinality Hosts from Network-Wide Traffic Measurements
    Liu, Yang
    Chen, Wenji
    Guan, Yong
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2016, 13 (05) : 547 - 558
  • [38] Identifying WeChat Red Packets and Fund Transfers via Analyzing Encrypted Network Traffic
    Yan, Feipeng
    Xu, Ming
    Qiao, Tong
    Wu, Ting
    Yang, Xue
    Zheng, Ning
    Choo, Kim-Kwang Raymond
    2018 17TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (IEEE TRUSTCOM) / 12TH IEEE INTERNATIONAL CONFERENCE ON BIG DATA SCIENCE AND ENGINEERING (IEEE BIGDATASE), 2018, : 1426 - 1432
  • [39] Understanding the topology of the road network and identifying key bayonet nodes to avoid traffic congestion
    Guan, Lechen
    Wang, Dongle
    Shao, Hu
    Fu, Hao
    Zhou, Jincheng
    INTERNATIONAL JOURNAL OF MODERN PHYSICS C, 2023, 34 (03):
  • [40] A spark-based method for identifying large-scale network burst traffic
    Sun, Yu-Lu
    Yun, Ben-Sheng
    Qian, Ya-Guan
    Feng, Jun
    Journal of Computers (Taiwan), 2021, 32 (04) : 123 - 136