NADSR: A Network Anomaly Detection Scheme Based on Representation

被引:0
|
作者
Liu, Xu [1 ,2 ]
Di, Xiaoqiang [1 ,2 ,3 ]
Liu, Weiyou [1 ]
Zhang, Xingxu [1 ]
Qi, Hui [1 ,2 ]
Li, Jinqing [1 ,2 ]
Zhao, Jianping [1 ,2 ]
Yang, Huamin [1 ,2 ]
机构
[1] Changchun Univ Sci & Technol, Sch Comp Sci & Technol, Changchun 130022, Peoples R China
[2] Jilin Prov Key Lab Network & Informat Secur, Changchun 130022, Peoples R China
[3] Changchun Univ Sci & Technol, Informat Ctr, Changchun 130022, Peoples R China
来源
KNOWLEDGE SCIENCE, ENGINEERING AND MANAGEMENT (KSEM 2020), PT I | 2020年 / 12274卷
关键词
Anomaly detection; Traffic feature; Data representation;
D O I
10.1007/978-3-030-55130-8_33
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Deep learning has been widely used for identifying anomaly network traffic. It trains supervised classifiers on a pre-screened numerical traffic feature dataset in the most cases, so the classification effectiveness depends heavily on feature representation. There is no unified feature representation method, and the current feature representation methods cannot profile traffic precisely. Therefore, how to design a traffic feature representation method to profile traffic is challenging. We propose a Network Anomaly Detection Scheme based on data Representation (NADSR). Data representation method converts raw network traffic into images by treating every numerical feature value as an image pixel and then creating a circulant pixel matrix for a traffic sample. It retains the traffic feature's spatial structure instead of padding empty pixels with constant values while directly reshaping a long feature vector into a pixel matrix. Experimental results verify the effectiveness of the proposed NADSR. It improves the overall detection accuracy compared with state-of-the-art methods, and also provides reference to solve security-related classification problems.
引用
收藏
页码:380 / 387
页数:8
相关论文
共 50 条
  • [21] Principal component-based anomaly detection scheme
    Shyu, ML
    Chen, SC
    Sarinnapakorn, K
    Chang, LW
    FOUNDATIONS AND NOVEL APPROACHES IN DATA MINING, 2006, 9 : 311 - +
  • [22] A novel boosting-based anomaly detection scheme
    Tong, HH
    Li, CR
    He, JR
    Tran, QA
    Duan, HX
    Li, X
    PROCEEDINGS OF 2005 INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND CYBERNETICS, VOLS 1-9, 2005, : 3199 - 3203
  • [23] Network Traffic Anomaly Detection: A Revisiting to Gaussian Process and Sparse Representation∗
    Wang, Yitu
    Nakachi, Takayuki
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2024, E107A (01) : 125 - 133
  • [24] LogPal: A Generic Anomaly Detection Scheme of Heterogeneous Logs for Network Systems
    Sun L.
    Xu X.
    Security and Communication Networks, 2023, 2023
  • [25] Feature Transfer Based Network Anomaly Detection
    Chen, Tao
    Wen, Kun
    SCIENCE OF CYBER SECURITY, SCISEC 2022, 2022, 13580 : 155 - 169
  • [26] Entropy-Based Anomaly Detection in a Network
    Shukla, Ajay Shankar
    Maurya, Rohit
    WIRELESS PERSONAL COMMUNICATIONS, 2018, 99 (04) : 1487 - 1501
  • [27] Entropy Based Method for Network Anomaly Detection
    Quan, Qian
    Hong-Yi, Che
    Rui, Zhang
    IEEE 15TH PACIFIC RIM INTERNATIONAL SYMPOSIUM ON DEPENDABLE COMPUTING, PROCEEDINGS, 2009, : 189 - 191
  • [28] Network Anomaly Detection based on Traffic Prediction
    Wang, Fengyu
    Gong, Bin
    Hu, Yi
    Zhang, Ningbo
    2009 INTERNATIONAL CONFERENCE ON SCALABLE COMPUTING AND COMMUNICATIONS & EIGHTH INTERNATIONAL CONFERENCE ON EMBEDDED COMPUTING, 2009, : 449 - 454
  • [29] Optimizing Network Anomaly Detection Scheme Using Instance Selection Mechanism
    Li, Yang
    Lu, Tian-Bo
    Guo, Li
    Tian, Zhi-Hong
    Qi, Lin
    GLOBECOM 2009 - 2009 IEEE GLOBAL TELECOMMUNICATIONS CONFERENCE, VOLS 1-8, 2009, : 425 - 431
  • [30] Network anomaly detection based on probabilistic analysis
    JinSoo Park
    Dong Hag Choi
    You-Boo Jeon
    Yunyoung Nam
    Min Hong
    Doo-Soon Park
    Soft Computing, 2018, 22 : 6621 - 6627