Network Attack Detection Based on Peer-to-Peer Clustering of SNMP Data

被引:0
|
作者
Cerroni, Walter [1 ]
Monti, Gabriele [1 ]
Moro, Gianluca [1 ]
Ramilli, Marco [1 ]
机构
[1] DEIS Univ Bologna, I-47521 Cesena, FC, Italy
关键词
Network security; distributed intrusion detection; SNMP; data mining; data clustering; peer-to-peer; ANOMALY DETECTION;
D O I
暂无
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
Network intrusion detection is a key security issue that can be tackled by means of different approaches. This paper describes a novel methodology for network attack detection based on the use of data mining techniques to process traffic information collected by a monitoring station from a set of hosts using the Simple Network Management Protocol (SNMP). The proposed approach, adopting unsupervised clustering techniques, allows to effectively distinguish normal traffic behavior from malicious network activity and to determine with very good accuracy what kind of attack is being perpetrated. Several monitoring stations are then interconnected according to any peer-to-peer network in order to share the knowledge base acquired with the proposed methodology, thus increasing the detection capabilities. An experimental test-bed has been implemented, which reproduces the case of a real web server under several attack techniques. Results of the experiments show the effectiveness of the proposed solution, with no detection failures of true attacks and very low false-positive rates (i.e. false alarms).
引用
收藏
页码:417 / 430
页数:14
相关论文
共 50 条
  • [1] A Social Network Peer-to-Peer Model for Peer Clustering
    Modarresi, Amir
    Mamat, Ali
    Ibrahim, Hamidah
    Mustapha, Norwati
    INTERNATIONAL SYMPOSIUM OF INFORMATION TECHNOLOGY 2008, VOLS 1-4, PROCEEDINGS: COGNITIVE INFORMATICS: BRIDGING NATURAL AND ARTIFICIAL KNOWLEDGE, 2008, : 1572 - 1578
  • [2] Grid-Based Contraction Clustering in a Peer-to-Peer Network
    Mariani, Antonio
    Epicoco, Italo
    Cafaro, Massimo
    Pulimeno, Marco
    MACHINE LEARNING, OPTIMIZATION, AND DATA SCIENCE, LOD 2022, PT II, 2023, 13811 : 373 - 387
  • [3] Security Clustering Algorithm Based on Reputation in Hierarchical Peer-to-Peer Network
    Chen, Mei
    Luo, Xin
    Wu, Guowen
    Tan, Yang
    Kita, Kenji
    INTERNATIONAL CONFERENCE ON GRAPHIC AND IMAGE PROCESSING (ICGIP 2012), 2013, 8768
  • [4] A decentralized gossip based approach for data clustering in peer-to-peer networks
    Azimi, Rasool
    Sajedi, Hedieh
    JOURNAL OF PARALLEL AND DISTRIBUTED COMPUTING, 2018, 119 : 64 - 80
  • [5] Highways:: Proximity clustering for scalable peer-to-peer network
    Lua, EK
    Crowcroft, J
    Pias, M
    FOURTH INTERNATIONAL CONFERENCE ON PEER-TO-PEER COMPUTING, PROCEEDINGS, 2004, : 266 - 267
  • [6] Models of distributed data clustering in peer-to-peer environments
    Khaled M. Hammouda
    Mohamed S. Kamel
    Knowledge and Information Systems, 2014, 38 : 303 - 329
  • [7] Models of distributed data clustering in peer-to-peer environments
    Hammouda, Khaled M.
    Kamel, Mohamed S.
    KNOWLEDGE AND INFORMATION SYSTEMS, 2014, 38 (02) : 303 - 329
  • [8] Clustering distributed data streams in peer-to-peer environments
    Bandyopadhyay, Sanghamitra
    Giannella, Chris
    Maulik, Ujjwal
    Kargupta, Hillol
    Liu, Kun
    Datta, Souptik
    INFORMATION SCIENCES, 2006, 176 (14) : 1952 - 1985
  • [9] Uncertain Data Clustering in Distributed Peer-to-Peer Networks
    Zhou, Jin
    Chen, Long
    Chen, C. L. Philip
    Wang, Yingxu
    Li, Han-Xiong
    IEEE TRANSACTIONS ON NEURAL NETWORKS AND LEARNING SYSTEMS, 2018, 29 (06) : 2392 - 2406
  • [10] A Stealthier Partitioning Attack against Bitcoin Peer-to-Peer Network
    Tran, Muoi
    Choi, Inho
    Moon, Gi Jun
    Vu, Anh V.
    Kang, Min Suk
    2020 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP 2020), 2020, : 894 - 909