Profiling Network Traffic Behavior for the purpose of Anomaly-based Intrusion Detection

被引:2
|
作者
Gill, Manmeet Singh [1 ]
Lindskog, Dale [1 ]
Zavarsky, Pavol [1 ]
机构
[1] Concordia Univ Edmonton, Dept Informat Syst Secur & Assurance Management, Edmonton, AB, Canada
关键词
NIDS; normal and abnormal behavior; profiling baseline; threshold; statistical Analysis; data sets; features; anomaly detection;
D O I
10.1109/TrustCom/BigDataSE.2018.00127
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper, we propose methods for profiling normal network traffic, methods that could be employed for the purpose of creating a baseline that would be used in the detection of threshold based anomalies in network traffic. This profiling is based on five proposed features of network traffic, and to illustrate, testing was done using recent and large data sets, and relying on various tools to statistically analyze network traffic. Although we have no pretensions of completeness, our results indicate that this is a promising approach to differentiate between normal and abnormal network traffic behavior, and therefore a promising contribution to anomaly based intrusion detection.
引用
收藏
页码:885 / 890
页数:6
相关论文
共 50 条
  • [21] Anomaly-based Network Intrusion Detection Model using Deep Learning in Airports
    Sczari, Behrooz
    Moller, Dietmar P. F.
    Deutschmann, Andreas
    [J]. 2018 17TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (IEEE TRUSTCOM) / 12TH IEEE INTERNATIONAL CONFERENCE ON BIG DATA SCIENCE AND ENGINEERING (IEEE BIGDATASE), 2018, : 1725 - 1729
  • [22] Game Theoretical Method for Anomaly-Based Intrusion Detection
    Wang, Zhiyong
    Xu, Shengwei
    Xu, Guoai
    Yin, Yongfeng
    Zhang, Miao
    Sun, Dawei
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2020, 2020
  • [23] Anomaly-based intrusion detection using Bayesian networks
    Tylman, Wojciech
    [J]. DEPCOS - RELCOMEX 2008: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON DEPENDABILITY OF COMPUTER SYSTEMS, 2008, : 211 - +
  • [24] SCADA Networks Anomaly-based Intrusion Detection System
    Almehmadi, Abdulaziz
    [J]. 11TH INTERNATIONAL CONFERENCE ON SECURITY OF INFORMATION AND NETWORKS (SIN 2018), 2018,
  • [25] Anomaly-Based Intrusion Detection Algorithms for Wireless Networks
    Fragkiadakis, Alexandros G.
    Siris, Vasilios A.
    Petroulakis, Nikolaos
    [J]. WIRED-WIRELESS INTERNET COMMUNICATIONS, PROCEEDINGS, 2010, 6074 : 192 - 203
  • [26] Anomaly-based intrusion detection system for IoT application
    Bhavsar M.
    Roy K.
    Kelly J.
    Olusola O.
    [J]. Discover Internet of Things, 2023, 3 (01):
  • [27] Feature Selection for Effective Anomaly-Based Intrusion Detection
    Ghali, Noreen I.
    [J]. INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2009, 9 (03): : 285 - 289
  • [28] Anomaly-based network intrusion detection with ensemble classifiers and meta-heuristic scale (ECMHS) in traffic flow streams
    Dasari, Durga Bhavani
    Edamadaka, Gayathri
    Chowdary, Ch. Smitha
    Sobhana, M.
    [J]. JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING, 2021, 12 (10) : 9241 - 9268
  • [29] Anomaly-based network intrusion detection with ensemble classifiers and meta-heuristic scale (ECMHS) in traffic flow streams
    Durga Bhavani Dasari
    Gayathri Edamadaka
    Ch. Smitha Chowdary
    M. Sobhana
    [J]. Journal of Ambient Intelligence and Humanized Computing, 2021, 12 : 9241 - 9268
  • [30] Design of Anomaly-Based Intrusion Detection System Using Fog Computing for IoT Network
    Kumar, Prabhat
    Gupta, Govind P.
    Tripathi, Rakesh
    [J]. AUTOMATIC CONTROL AND COMPUTER SCIENCES, 2021, 55 (02) : 137 - 147