{"title":"The application of a low pass filter in anomaly network intrusion detection","authors":"Jun Li, C. Manikopoulos","doi":"10.1109/IAW.2004.1437826","DOIUrl":null,"url":null,"abstract":"A common method of identifying attacks with anomaly network intrusion detection system (NIDS) is to detect significant deviations in network traffic compared to normal conditions. Such changes may include unexpected high traffic volume, caused by, for example, a denial of service (DoS) attack. However, recent research on traffic engineering has demonstrated that modern data network traffic exhibits high burstiness at a wide range of observation window sizes, i.e., self-similarity (V. Paxon et al., 1995, W.E. Leland et al., 1994), The self-similar traffic may challenge the traditional anomaly NIDS by making it unable to distinguish attacks from traffic bursts. In this paper, we investigate the employment of low pass filters in the anomaly NIDS to smooth the burstiness in network traffic measurements and thus reduce the false alarms. We studied the use of the MWA filter and the Savitzky-Golay filter. By analyzing the resulting network traffic measurements, we found out that the MWA filter significantly changed, while the Savitzky-Golay filter only moderately altered, the statistical properties of the network traffic measurements. To investigate the effectiveness of a low pass filter on anomaly NIDS, we applied the low pass filter to our anomaly NIDS, namely, the MIB anomaly intrusion detection (MAID) system. By employing these filters in MAID, we observed that the Savitzky-Golay filter outperforms the MWA filter. The results of the performance evaluation process also demonstrated that the low pass filter can significantly enhance the detection capacity of MAID, by reducing its false alarm rate.","PeriodicalId":141403,"journal":{"name":"Proceedings from the Fifth Annual IEEE SMC Information Assurance Workshop, 2004.","volume":"5 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2004-06-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Proceedings from the Fifth Annual IEEE SMC Information Assurance Workshop, 2004.","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/IAW.2004.1437826","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
A common method of identifying attacks with anomaly network intrusion detection system (NIDS) is to detect significant deviations in network traffic compared to normal conditions. Such changes may include unexpected high traffic volume, caused by, for example, a denial of service (DoS) attack. However, recent research on traffic engineering has demonstrated that modern data network traffic exhibits high burstiness at a wide range of observation window sizes, i.e., self-similarity (V. Paxon et al., 1995, W.E. Leland et al., 1994), The self-similar traffic may challenge the traditional anomaly NIDS by making it unable to distinguish attacks from traffic bursts. In this paper, we investigate the employment of low pass filters in the anomaly NIDS to smooth the burstiness in network traffic measurements and thus reduce the false alarms. We studied the use of the MWA filter and the Savitzky-Golay filter. By analyzing the resulting network traffic measurements, we found out that the MWA filter significantly changed, while the Savitzky-Golay filter only moderately altered, the statistical properties of the network traffic measurements. To investigate the effectiveness of a low pass filter on anomaly NIDS, we applied the low pass filter to our anomaly NIDS, namely, the MIB anomaly intrusion detection (MAID) system. By employing these filters in MAID, we observed that the Savitzky-Golay filter outperforms the MWA filter. The results of the performance evaluation process also demonstrated that the low pass filter can significantly enhance the detection capacity of MAID, by reducing its false alarm rate.
异常网络入侵检测系统(NIDS)识别攻击的常用方法是检测网络流量与正常情况相比的显著偏差。这些变化可能包括意外的高流量,例如由拒绝服务(DoS)攻击引起的流量。然而,最近的流量工程研究表明,现代数据网络流量在大范围的观测窗口大小下表现出高爆发性,即自相似性(V. Paxon et al., 1995, W.E. Leland et al., 1994),自相似流量可能会使传统的异常NIDS无法区分攻击和流量爆发,从而对其构成挑战。在本文中,我们研究了在异常NIDS中使用低通滤波器来平滑网络流量测量中的突发性,从而减少假警报。我们研究了MWA滤波器和Savitzky-Golay滤波器的使用。通过分析得到的网络流量测量结果,我们发现MWA滤波器显著改变,而Savitzky-Golay滤波器仅适度改变网络流量测量的统计特性。为了研究低通滤波器对异常入侵检测的有效性,我们将低通滤波器应用于我们的异常入侵检测,即MIB异常入侵检测(MAID)系统。通过在MAID中使用这些滤波器,我们观察到Savitzky-Golay滤波器优于MWA滤波器。性能评估过程的结果也表明,低通滤波器可以显著提高MAID的检测能力,降低其虚警率。