Anomaly Detection and Visualization using Fisher Discriminant Clustering of Network Entropy

被引:0
|
作者
Celenk, Mehmet [1 ]
Conley, Thomas [1 ]
Willis, John [1 ]
Graham, James [1 ]
机构
[1] Ohio Univ, Stocker Ctr, Sch Elect Engn & Comp Sci, Athens, OH 45701 USA
关键词
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Entropy has been widely used to quantify information for display and examination in determining network status and in detecting anomalies. Although entropy-based methods are effective, they rely on long-term network statistics. Here, we propose an approach that deduces short term observations of network features and their respective time averaged entropies. Acute changes are detected in network feature space and depicted in a visually compact information graph. First, average entropy for each feature is calculated for every second of observation. Then, the resultant short-term information measurement is subjected to first- and second-order time averaging statistics. These time-varying statistics are used as the basis of a novel approach to anomaly estimation based on the well-known Fisher Linear Discriminant (FLD). This process then initiates stochastic clustering to identify the exact time of the security incident or attack on the network. The proposed method is tested on real-tune network traffic data collected from Ohio University's main Internet connection. Experimentation has shown that the presented FLD based method is accurate in identifying anomalies in network feature space. Furthermore, it's performance is highly robust in the presence of bursty network traffic and it is able to detect network anomalies such as BotNet, worm outbreaks, and denial of service attacks.
引用
收藏
页码:219 / 223
页数:5
相关论文
共 50 条
  • [41] Microcalcifications Detection Using Fisher's Linear Discriminant and Breast Density
    Rodriguez, G. A.
    Gonzalez, J. A.
    Altamirano, L.
    Guichard, J. S.
    Diaz, R.
    [J]. SOFTWARE TOOLS AND ALGORITHMS FOR BIOLOGICAL SYSTEMS, 2011, 696 : 451 - 459
  • [42] Detection of Network Intrusions Using Anomaly Detection
    Macedo, Andre Manuel
    Magalhaes, Joao Paulo
    [J]. 2023 20TH ACS/IEEE INTERNATIONAL CONFERENCE ON COMPUTER SYSTEMS AND APPLICATIONS, AICCSA, 2023,
  • [43] Network Traffic Anomaly Detection Based on Maximum Entropy Model
    Qian Yaguan
    Wu Chunming
    Yang Qiang
    Wang Bin
    [J]. CHINESE JOURNAL OF ELECTRONICS, 2012, 21 (03) : 579 - 582
  • [44] A Network Anomaly Detection Method Based on Relative Entropy Theory
    Zhang, Ya-ling
    Han, Zhao-guo
    Ren, Jiao-xia
    [J]. PROCEEDINGS OF THE SECOND INTERNATIONAL SYMPOSIUM ON ELECTRONIC COMMERCE AND SECURITY, VOL I, 2009, : 231 - 235
  • [45] Entropy-Based Feature Selection for Network Anomaly Detection
    Alabi, Ruth
    Yurtkan, Kamil
    [J]. 2018 2ND INTERNATIONAL SYMPOSIUM ON MULTIDISCIPLINARY STUDIES AND INNOVATIVE TECHNOLOGIES (ISMSIT), 2018, : 563 - 569
  • [46] Clustering in wavelet domain: A multiresolution ART network for anomaly detection
    Aradhye, HB
    Bakshi, BR
    Davis, JF
    Ahalt, SC
    [J]. AICHE JOURNAL, 2004, 50 (10) : 2455 - 2466
  • [47] Clustering-based label estimation for network anomaly detection
    Baek, Sunhee
    Kwon, Donghwoon
    Suh, Sang C.
    Kim, Hyunjoo
    Kim, Ikkyun
    Kim, Jinoh
    [J]. DIGITAL COMMUNICATIONS AND NETWORKS, 2021, 7 (01) : 37 - 44
  • [48] Fuzzified Cuckoo based Clustering Technique for Network Anomaly Detection
    Garg, Sahil
    Batra, Shalini
    [J]. COMPUTERS & ELECTRICAL ENGINEERING, 2018, 71 : 798 - 817
  • [49] A grid-based clustering algorithm for network anomaly detection
    Wei, Xiaotao
    Huang, Houkuan
    Tian, Shengfeng
    [J]. PROCEEDINGS OF THE FIRST INTERNATIONAL SYMPOSIUM ON DATA, PRIVACY, AND E-COMMERCE, 2007, : 104 - +
  • [50] Network anomaly detection based on semi-supervised clustering
    Wei Xiaotao
    Huang Houkuan
    Tian Shengfeng
    [J]. NEW ADVANCES IN SIMULATION, MODELLING AND OPTIMIZATION (SMO '07), 2007, : 440 - +