A hands-off approach to network intrusion detection

Yuning Ling, Marcus Rosti, Gregory Swanson
{"title":"A hands-off approach to network intrusion detection","authors":"Yuning Ling, Marcus Rosti, Gregory Swanson","doi":"10.1109/SIEDS.2016.7489302","DOIUrl":null,"url":null,"abstract":"Networks are inherently vulnerable to attack and we need dynamic detection methods to find the evergrowing number and types of attacks. We assume that the access pattern of an attacker fundamentally differs from that of benign users. If that is true, we may be able to tease out the differences in the underlying structure of attackers and normal activity. Our research investigates unsupervised clustering techniques for network intrusion detection. The data comes from our most readily available source, the University of Virginia's network traffic. Our approach collapses all of the network communication between a host-source pair into a single descriptive data point, or netflow. The extracted features are then clustered to determine the different access patterns and separate types of communications. Features extracted from the netflow will be used to devise features that summarize all the network activity of an IP node. This aggregated IP level information is then used to cluster the IPs, which should enable us to differentiate between user groups. When a node's behavior changes by switching its associated cluster or it differs substantially from other similar nodes it may reveal a compromise. This approach should allow us to identify outliers that differ significantly from typical traffic of its corresponding cluster.","PeriodicalId":426864,"journal":{"name":"2016 IEEE Systems and Information Engineering Design Symposium (SIEDS)","volume":"12 7","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2016-04-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2016 IEEE Systems and Information Engineering Design Symposium (SIEDS)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/SIEDS.2016.7489302","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1

Abstract

Networks are inherently vulnerable to attack and we need dynamic detection methods to find the evergrowing number and types of attacks. We assume that the access pattern of an attacker fundamentally differs from that of benign users. If that is true, we may be able to tease out the differences in the underlying structure of attackers and normal activity. Our research investigates unsupervised clustering techniques for network intrusion detection. The data comes from our most readily available source, the University of Virginia's network traffic. Our approach collapses all of the network communication between a host-source pair into a single descriptive data point, or netflow. The extracted features are then clustered to determine the different access patterns and separate types of communications. Features extracted from the netflow will be used to devise features that summarize all the network activity of an IP node. This aggregated IP level information is then used to cluster the IPs, which should enable us to differentiate between user groups. When a node's behavior changes by switching its associated cluster or it differs substantially from other similar nodes it may reveal a compromise. This approach should allow us to identify outliers that differ significantly from typical traffic of its corresponding cluster.
一种不干涉的网络入侵检测方法
网络本身就容易受到攻击,我们需要动态检测方法来发现不断增长的攻击数量和类型。我们假设攻击者的访问模式与良性用户的访问模式根本不同。如果这是真的,我们也许能够梳理出攻击者和正常活动的潜在结构的差异。我们的研究探讨了用于网络入侵检测的无监督聚类技术。这些数据来自我们最容易获得的来源,弗吉尼亚大学的网络流量。我们的方法将主机-源对之间的所有网络通信分解为单个描述性数据点或netflow。然后对提取的特征进行聚类,以确定不同的访问模式和单独的通信类型。从netflow中提取的特征将用于设计总结IP节点的所有网络活动的特征。然后使用这些聚合的IP级别信息对IP进行集群,从而使我们能够区分不同的用户组。当一个节点通过切换其关联的集群而改变其行为时,或者它与其他类似的节点有很大的不同时,就可能表明存在妥协。这种方法应该允许我们识别与相应集群的典型流量显著不同的异常值。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信