Network anomaly detection based on clustering of sequence patterns

被引:0
|
作者
Noh, Sang-Kyun
Kim, Yong-Min
Kim, DongKook
Noh, Bong-Nam [1 ]
机构
[1] Chonnam Natl Univ, Interdisciplinary Program Informat Secur, Kwangju 500757, South Korea
[2] Chonnam Natl Univ, Dept Elect Commerce, Yeosu 550749, South Korea
[3] Chonnam Natl Univ, Div Elect Comp & Informat Engn, Kwangju 500757, South Korea
来源
COMPUTATIONAL SCIENCE AND ITS APPLICATIONS - ICCSA 2006, PT 2 | 2006年 / 3981卷
关键词
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Anomaly detection is a method for determining behaviors which do not accord with normal ones. It is mostly used for detecting abnormal behaviors, mutational and unknown attacks. In this paper, we propose a technique that generates patterns about network-based normal behaviors in blocks of a TCP network session for the anomaly detection. One session is expressed as one pattern based on a stream of the packets in the session, and thus the pattern we generate has a sequential feature. We use the ROCK algorithm to cluster the sequence patterns which have categorical attributes. This algorithm performs clustering based on our similarity function which uses Dynamic Programming. The many sequence patterns of the normal behaviors can be reduced to several representative sequence patterns using the clustering. Our detecting sensor uses profiling dataset that are constructed by the representative sequence patterns of normal behaviors. We show the effectiveness of proposed model by using results from the 1999 DARPA Intrusion Detection Evaluation.
引用
收藏
页码:349 / 358
页数:10
相关论文
共 50 条
  • [31] Research on anomaly detection method of satellite communication network based on normal behavior clustering
    Army Command College, Nanjing 210045, China
    不详
    不详
    Jiefangjun Ligong Daxue Xuebao, 2008, 5 (497-501):
  • [32] LogGAN: A Sequence-Based Generative Adversarial Network for Anomaly Detection Based on System Logs
    Xia, Bin
    Yin, Junjie
    Xu, Jian
    Li, Yun
    SCIENCE OF CYBER SECURITY, SCISEC 2019, 2019, 11933 : 61 - 76
  • [33] Clustering in wavelet domain: A multiresolution ART network for anomaly detection
    Aradhye, HB
    Bakshi, BR
    Davis, JF
    Ahalt, SC
    AICHE JOURNAL, 2004, 50 (10) : 2455 - 2466
  • [34] Hybrid Anomaly Detection by Using Clustering for Wireless Sensor Network
    Ahmad, Bilal
    Jian, Wang
    Ali, Zain Anwar
    Tanvir, Sania
    Khan, M. Sadiq Ali
    WIRELESS PERSONAL COMMUNICATIONS, 2019, 106 (04) : 1841 - 1853
  • [35] Hybrid Anomaly Detection by Using Clustering for Wireless Sensor Network
    Bilal Ahmad
    Wang Jian
    Zain Anwar Ali
    Sania Tanvir
    M. Sadiq Ali Khan
    Wireless Personal Communications, 2019, 106 : 1841 - 1853
  • [36] Network Anomaly Detection via Clustering and Custom Kernel in MSVM
    Mewada, Arvind
    Khan, Shamaila
    Gedam, Prafful
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2010, 1 (01) : 30 - 33
  • [37] Internal Network Monitoring and Anomaly Detection through Host Clustering
    Beukema, W. J. B.
    Attema, T.
    Schotanus, H. A.
    ICISSP: PROCEEDINGS OF THE 3RD INTERNATIONAL CONFERENCE ON INFORMATION SYSTEMS SECURITY AND PRIVACY, 2017, : 694 - 703
  • [38] Anomaly Detection for Power Consumption Patterns Based on Linear Discriminant Analysis and Density Peak Clustering
    Wang J.
    Zhang S.
    Dianli Xitong Zidonghua/Automation of Electric Power Systems, 2022, 46 (05): : 87 - 95
  • [39] Clustering Algorithm Based on Outlier Detection for Anomaly Intrusion Detection
    Yin, Shang-Nan
    Kang, Ho-Seok
    Kim, Sung-Ryul
    JOURNAL OF INTERNET TECHNOLOGY, 2016, 17 (02): : 291 - 299
  • [40] Neural Network based Anomaly Detection
    Callegari, Christian
    Giordano, Stefano
    Pagano, Michele
    2014 IEEE 19TH INTERNATIONAL WORKSHOP ON COMPUTER AIDED MODELING AND DESIGN OF COMMUNICATION LINKS AND NETWORKS (CAMAD), 2014, : 310 - 314