{"title":"一种不干涉的网络入侵检测方法","authors":"Yuning Ling, Marcus Rosti, Gregory Swanson","doi":"10.1109/SIEDS.2016.7489302","DOIUrl":null,"url":null,"abstract":"Networks are inherently vulnerable to attack and we need dynamic detection methods to find the evergrowing number and types of attacks. We assume that the access pattern of an attacker fundamentally differs from that of benign users. If that is true, we may be able to tease out the differences in the underlying structure of attackers and normal activity. Our research investigates unsupervised clustering techniques for network intrusion detection. The data comes from our most readily available source, the University of Virginia's network traffic. Our approach collapses all of the network communication between a host-source pair into a single descriptive data point, or netflow. The extracted features are then clustered to determine the different access patterns and separate types of communications. Features extracted from the netflow will be used to devise features that summarize all the network activity of an IP node. This aggregated IP level information is then used to cluster the IPs, which should enable us to differentiate between user groups. When a node's behavior changes by switching its associated cluster or it differs substantially from other similar nodes it may reveal a compromise. This approach should allow us to identify outliers that differ significantly from typical traffic of its corresponding cluster.","PeriodicalId":426864,"journal":{"name":"2016 IEEE Systems and Information Engineering Design Symposium (SIEDS)","volume":"12 7","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2016-04-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":"{\"title\":\"A hands-off approach to network intrusion detection\",\"authors\":\"Yuning Ling, Marcus Rosti, Gregory Swanson\",\"doi\":\"10.1109/SIEDS.2016.7489302\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Networks are inherently vulnerable to attack and we need dynamic detection methods to find the evergrowing number and types of attacks. We assume that the access pattern of an attacker fundamentally differs from that of benign users. If that is true, we may be able to tease out the differences in the underlying structure of attackers and normal activity. Our research investigates unsupervised clustering techniques for network intrusion detection. The data comes from our most readily available source, the University of Virginia's network traffic. Our approach collapses all of the network communication between a host-source pair into a single descriptive data point, or netflow. The extracted features are then clustered to determine the different access patterns and separate types of communications. Features extracted from the netflow will be used to devise features that summarize all the network activity of an IP node. This aggregated IP level information is then used to cluster the IPs, which should enable us to differentiate between user groups. When a node's behavior changes by switching its associated cluster or it differs substantially from other similar nodes it may reveal a compromise. This approach should allow us to identify outliers that differ significantly from typical traffic of its corresponding cluster.\",\"PeriodicalId\":426864,\"journal\":{\"name\":\"2016 IEEE Systems and Information Engineering Design Symposium (SIEDS)\",\"volume\":\"12 7\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2016-04-29\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"1\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2016 IEEE Systems and Information Engineering Design Symposium (SIEDS)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/SIEDS.2016.7489302\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2016 IEEE Systems and Information Engineering Design Symposium (SIEDS)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/SIEDS.2016.7489302","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
A hands-off approach to network intrusion detection
Networks are inherently vulnerable to attack and we need dynamic detection methods to find the evergrowing number and types of attacks. We assume that the access pattern of an attacker fundamentally differs from that of benign users. If that is true, we may be able to tease out the differences in the underlying structure of attackers and normal activity. Our research investigates unsupervised clustering techniques for network intrusion detection. The data comes from our most readily available source, the University of Virginia's network traffic. Our approach collapses all of the network communication between a host-source pair into a single descriptive data point, or netflow. The extracted features are then clustered to determine the different access patterns and separate types of communications. Features extracted from the netflow will be used to devise features that summarize all the network activity of an IP node. This aggregated IP level information is then used to cluster the IPs, which should enable us to differentiate between user groups. When a node's behavior changes by switching its associated cluster or it differs substantially from other similar nodes it may reveal a compromise. This approach should allow us to identify outliers that differ significantly from typical traffic of its corresponding cluster.