Detecting malicious use with unlabelled data using clustering and outlier analysis

被引:0
|
作者
Knight, GS [1 ]
Carosielli, L [1 ]
机构
[1] Royal Mil Coll Canada, Dept Elect & Comp Engn, Kingston, ON, Canada
关键词
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Most commercial intrusion detection systems (IDSs) presently available are signature-based network IDSs. Organisations Using these IDSs are still experiencing difficulties in detecting intrusive activity oil their networks since novel new attacks are consistently being encountered, and analysts call miss legitimate alarms when reviewing large alarm logs that contain a high number of false positives. There has been research investigating the Use Of data Mining techniques to effectively detect malicious activity in all enterprise network. The results of many of these projects have demonstrated that these techniques can be effective when trained/calibrated using labelled datasets. Labelled datasets identify and characterize normal and malicious traffic for Use In training/calibrating the detection sensor. However, the creation of labelled datasets is resource intensive. It requires a significant effort by security analysts to create a data set that characterises the traffic in a specific enterprise network environment. This research simulates and analyses malicious activity oil an enterprise network to explore the detection of malicious activity with data mining techniques Using unlabelled datasets. Semi-discrete decomposition (SDD) is Used as a clustering and outlier analysis technique to characterize network traffic as either normal or anomalous.
引用
收藏
页码:205 / 216
页数:12
相关论文
共 50 条
  • [1] A sequential outlier detecting method using a clustering algorithm
    Seo, Han Son
    Yoon, Min
    [J]. KOREAN JOURNAL OF APPLIED STATISTICS, 2016, 29 (04) : 699 - 706
  • [2] Detecting Malicious Tweets in Trending Topics using Clustering and Classification
    Soman, Saini Jacob
    Murugappan, S.
    [J]. 2014 INTERNATIONAL CONFERENCE ON RECENT TRENDS IN INFORMATION TECHNOLOGY (ICRTIT), 2014,
  • [3] Detecting Malicious URLs Using Lexical Analysis
    Mamun, Mohammad Saiful Islam
    Rathore, Mohammad Ahmad
    Lashkari, Arash Habibi
    Stakhanova, Natalia
    Ghorbani, Ali A.
    [J]. NETWORK AND SYSTEM SECURITY, (NSS 2016), 2016, 9955 : 467 - 482
  • [4] Detecting and verifying dissimilar patterns in unlabelled data
    Wallace, M
    Mylonas, P
    Kollias, S
    [J]. SOFT COMPUTING: METHODOLOGIES AND APPLICATIONS, 2005, : 247 - 258
  • [5] Outlier Detection for Categorial Data Using Clustering Algorithms
    Nowak-Brzezinska, Agnieszka
    Lazarz, Weronika
    [J]. COMPUTATIONAL SCIENCE - ICCS 2022, PT III, 2022, 13352 : 714 - 727
  • [6] A Needle is an Outlier in a Haystack: Hunting Malicious PyPI Packages with Code Clustering
    Liang, Wentao
    Ling, Xiang
    Wu, Jingzheng
    Luo, Tianyue
    Wu, Yanjun
    [J]. 2023 38TH IEEE/ACM INTERNATIONAL CONFERENCE ON AUTOMATED SOFTWARE ENGINEERING, ASE, 2023, : 307 - 318
  • [7] Detecting Malicious Domains by Massive DNS Traffic Data Analysis
    Tian, Shiqi
    Fang, Cheng
    Liu, Jun
    Lei, Zhenming
    [J]. 2016 8TH INTERNATIONAL CONFERENCE ON INTELLIGENT HUMAN-MACHINE SYSTEMS AND CYBERNETICS (IHMSC), VOL. 1, 2016, : 130 - 133
  • [8] Analysis of Flight Data Using Clustering Techniques for Detecting Abnormal Operations
    Li, Lishuai
    Das, Santanu
    Hansman, R. John
    Palacios, Rafael
    Srivastava, Ashok N.
    [J]. JOURNAL OF AEROSPACE INFORMATION SYSTEMS, 2015, 12 (09): : 587 - 598
  • [9] Outlier Detection in Data Streams Using Various Clustering Approaches
    Makkar, Kusum
    Sharma, Meghna
    [J]. 2015 2ND INTERNATIONAL CONFERENCE ON COMPUTING FOR SUSTAINABLE GLOBAL DEVELOPMENT (INDIACOM), 2015, : 690 - 693
  • [10] Unsupervised Outlier Detection in Streaming Data Using Weighted Clustering
    Thakran, Yogita
    Toshniwal, Durga
    [J]. 2012 12TH INTERNATIONAL CONFERENCE ON INTELLIGENT SYSTEMS DESIGN AND APPLICATIONS (ISDA), 2012, : 947 - 952