Data preprocessing for anomaly based network intrusion detection: A review

被引:164
|
作者
Davis, Jonathan J. [1 ]
Clark, Andrew J. [2 ]
机构
[1] DSTO, Div C3I, Edinburgh, SA 5111, Australia
[2] Queensland Univ Technol, Informat Secur Inst, Brisbane, Qld 4001, Australia
关键词
Data preprocessing; Network intrusion; Anomaly detection; Data mining; Feature construction; Feature selection; SYSTEM;
D O I
10.1016/j.cose.2011.05.008
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Data preprocessing is widely recognized as an important stage in anomaly detection. This paper reviews the data preprocessing techniques used by anomaly-based network intrusion detection systems (NIDS), concentrating on which aspects of the network traffic are analyzed, and what feature construction and selection methods have been used. Motivation for the paper comes from the large impact data preprocessing has on the accuracy and capability of anomaly-based NIDS. The review finds that many NIDS limit their view of network traffic to the TCP/IP packet headers. Time-based statistics can be derived from these headers to detect network scans, network worm behavior, and denial of service attacks. A number of other NIDS perform deeper inspection of request packets to detect attacks against network services and network applications. More recent approaches analyze full service responses to detect attacks targeting clients. The review covers a wide range of NIDS, highlighting which classes of attack are detectable by each of these approaches. Data preprocessing is found to predominantly rely on expert domain knowledge for identifying the most relevant parts of network traffic and for constructing the initial candidate set of traffic features. On the other hand, automated methods have been widely used for feature extraction to reduce data dimensionality, and feature selection to find the most relevant subset of features from this candidate set. The review shows a trend toward deeper packet inspection to construct more relevant features through targeted content parsing. These context sensitive features are required to detect current attacks. Crown Copyright (C) 2011 Published by Elsevier Ltd. All rights reserved.
引用
收藏
页码:353 / 375
页数:23
相关论文
共 50 条
  • [31] Anomaly detection based Intrusion Detection
    Novikov, Dima
    Yampolskiy, Roman V.
    Reznik, Leon
    THIRD INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY: NEW GENERATIONS, PROCEEDINGS, 2006, : 420 - +
  • [32] Application Data Consistency Checking for Anomaly Based Intrusion Detection
    Sarrouy, Olivier
    Totel, Eric
    Jouga, Bernard
    STABILIZATION, SAFETY, AND SECURITY OF DISTRIBUTED SYSTEMS, PROCEEDINGS, 2009, 5873 : 726 - 740
  • [33] A Convolutional Neural Network for Improved Anomaly-Based Network Intrusion Detection
    Al-Turaiki, Isra
    Altwaijry, Najwa
    BIG DATA, 2021, 9 (03) : 233 - 252
  • [34] Anomaly detection based on unsupervised niche clustering with application to network intrusion detection
    Leon, E
    Nasraoui, F
    Gomez, J
    CEC2004: PROCEEDINGS OF THE 2004 CONGRESS ON EVOLUTIONARY COMPUTATION, VOLS 1 AND 2, 2004, : 502 - 508
  • [35] Network based intrusion detection: A review of technologies
    Richards, K
    COMPUTERS & SECURITY, 1999, 18 (08) : 671 - 682
  • [36] Two Stage Anomaly Detection for Network Intrusion Detection
    Neuschmied, Helmut
    Winter, Martin
    Hofer-Schmitz, Katharina
    Stojanovic, Branka
    Kleb, Ulrike
    ICISSP: PROCEEDINGS OF THE 7TH INTERNATIONAL CONFERENCE ON INFORMATION SYSTEMS SECURITY AND PRIVACY, 2021, : 450 - 457
  • [37] PGAN:A Generative Adversarial Network based Anomaly Detection Method for Network Intrusion Detection System
    Li, Zeyi
    Wang, Yun
    Wang, Pan
    Su, Haorui
    2021 IEEE 20TH INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM 2021), 2021, : 734 - 741
  • [38] Anomaly-based network intrusion detection: Techniques, systems and challenges
    Garcia-Teodoro, P.
    Diaz-Verdejo, J.
    Macia-Fernandez, G.
    Vazquez, E.
    COMPUTERS & SECURITY, 2009, 28 (1-2) : 18 - 28
  • [39] A Membership Function for Feature Clustering Based Network Intrusion and Anomaly Detection
    Nagaraja, Arun
    Kumar, T. Satish
    ICEMIS'18: PROCEEDINGS OF THE FOURTH INTERNATIONAL CONFERENCE ON ENGINEERING AND MIS, 2018,
  • [40] Anomaly based Resilient Network Intrusion Detection using Inferential Autoencoders
    Hannan, Abdul
    Gruhl, Christian
    Sick, Bernhard
    PROCEEDINGS OF THE 2021 IEEE INTERNATIONAL CONFERENCE ON CYBER SECURITY AND RESILIENCE (IEEE CSR), 2021, : 1 - 7