BigFlow: Real-time and reliable anomaly-based intrusion detection for high-speed networks

被引:47
|
作者
Viegas, Eduardo [1 ,2 ]
Santin, Altair [1 ]
Bessani, Alysson [2 ]
Neves, Nuno [2 ]
机构
[1] Pontificia Univ Catolica Parana, Grad Program Comp Sci, Curitiba, Parana, Brazil
[2] Univ Lisbon, Fac Ciencias, LaSIGE, Lisbon, Portugal
关键词
Data stream; Stream learning; Classification reliability; Anomaly-based intrusion detection; REJECT OPTION; CLASSIFICATION;
D O I
10.1016/j.future.2018.09.051
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Existing machine learning solutions for network-based intrusion detection cannot maintain their reliability over time when facing high-speed networks and evolving attacks. In this paper, we propose BigFlow, an approach capable of processing evolving network traffic while being scalable to large packet rates. BigFlow employs a verification method that checks if the classifier outcome is valid in order to provide reliability. If a suspicious packet is found, an expert may help BigFlow to incrementally change the classification model. Experiments with BigFlow, over a network traffic dataset spanning a full year, demonstrate that it can maintain high accuracy over time. It requires as little as 4% of storage and between 0.05% and 4% of training time, compared with other approaches. BigFlow is scalable, coping with a 10-Gbps network bandwidth in a 40-core cluster commodity hardware. (C) 2018 Elsevier B.V. All rights reserved.
引用
收藏
页码:473 / 485
页数:13
相关论文
共 50 条
  • [21] Analysis of anomaly-based intrusion detection techniques for mobile wireless networks
    Liu, Lijun
    Ma, Hongxia
    Liu, Jianqiu
    Li, Zhuowei
    [J]. 2008 PROCEEDINGS OF INFORMATION TECHNOLOGY AND ENVIRONMENTAL SYSTEM SCIENCES: ITESS 2008, VOL 2, 2008, : 827 - 832
  • [22] ANOMALY-BASED NETWORK INTRUSION DETECTION METHODS
    Nevlud, Pavel
    Bures, Miroslav
    Kapicak, Lukas
    Zdralek, Jaroslav
    [J]. ADVANCES IN ELECTRICAL AND ELECTRONIC ENGINEERING, 2013, 11 (06) : 468 - 474
  • [23] REAL-TIME TRAFFIC MEASUREMENTS FOR HIGH-SPEED NETWORKS
    HERSHEY, PC
    SILIO, CB
    WACLAWSKY, JG
    [J]. BT TECHNOLOGY JOURNAL, 1995, 13 (03): : 113 - 122
  • [24] LSTM for Anomaly-Based Network Intrusion Detection
    Althubiti, Sara A.
    Jones, Eric Marcell, Jr.
    Roy, Kaushik
    [J]. 2018 28TH INTERNATIONAL TELECOMMUNICATION NETWORKS AND APPLICATIONS CONFERENCE (ITNAC), 2018, : 293 - 295
  • [25] Anomaly-Based Network Intrusion Detection System
    Villalba, L. J. G.
    Orozco, A. L. S.
    Vidal, J. M.
    [J]. IEEE LATIN AMERICA TRANSACTIONS, 2015, 13 (03) : 850 - 855
  • [26] Intrusion detection for high-speed networks based on producing system
    Chen, Ken
    Yu, Fei
    Xu, Cheng
    Liu, Yan
    [J]. FIRST INTERNATIONAL WORKSHOP ON KNOWLEDGE DISCOVERY AND DATA MINING, PROCEEDINGS, 2007, : 532 - +
  • [27] A stateful real time intrusion detection system for high-speed network
    Sourour, Meharouech
    Adel, Bouhoula
    Tarek, Abbes
    [J]. 21st International Conference on Advanced Networking and Applications, Proceedings, 2007, : 404 - 411
  • [28] Architecture of intrusion detection for high-speed networks
    Chen, Xun-Xun
    Fang, Bin-Xing
    Li, Lei
    [J]. Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2004, 41 (09): : 1481 - 1487
  • [29] Efficient Intrusion Detection for High-speed Networks
    Ma, Gaolong
    Tang, Wen
    [J]. INFORMATION TECHNOLOGY APPLICATIONS IN INDUSTRY, PTS 1-4, 2013, 263-266 : 2915 - 2919
  • [30] Intrusion detection and simulation for high-speed networks
    Yu, F
    Dai, XP
    Shen, Y
    Huang, H
    Zhu, ML
    [J]. 2005 INTERNATIONAL CONFERENCE ON SERVICES SYSTEMS AND SERVICES MANAGEMENT, VOLS 1 AND 2, PROCEEDINGS, 2005, : 835 - 840