{"title":"应用多元数据分析方法识别双向攻击流的关键参数","authors":"Korakoch Wilailux, S. Ngamsuriyaroj","doi":"10.1109/ACDT.2015.7111611","DOIUrl":null,"url":null,"abstract":"Flow export data has been intensively used in anomaly-based intrusion detection systems; however, we have limited understanding of the characteristics of bi-directional flow parameters with respect to the types of network attacks. To recognize the relationship between traffic parameters, we propose an empirical model which analyzes synthetically generated five network attacks within a closed environment, and perform exploratory data analysis using principal component analysis. The experimental results have identified relevant key parameters for selecting good candidates for intrusion detection analysis. The analysis capabilities of bi-directional flow parameters and their characteristics persisting in selected attacks have been diagnosed and revealed.","PeriodicalId":311885,"journal":{"name":"2015 Asian Conference on Defence Technology (ACDT)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2015-04-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Applying multivariate data analysis to identify key parameters of bi-directional attack flows\",\"authors\":\"Korakoch Wilailux, S. Ngamsuriyaroj\",\"doi\":\"10.1109/ACDT.2015.7111611\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Flow export data has been intensively used in anomaly-based intrusion detection systems; however, we have limited understanding of the characteristics of bi-directional flow parameters with respect to the types of network attacks. To recognize the relationship between traffic parameters, we propose an empirical model which analyzes synthetically generated five network attacks within a closed environment, and perform exploratory data analysis using principal component analysis. The experimental results have identified relevant key parameters for selecting good candidates for intrusion detection analysis. The analysis capabilities of bi-directional flow parameters and their characteristics persisting in selected attacks have been diagnosed and revealed.\",\"PeriodicalId\":311885,\"journal\":{\"name\":\"2015 Asian Conference on Defence Technology (ACDT)\",\"volume\":\"23 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2015-04-23\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2015 Asian Conference on Defence Technology (ACDT)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ACDT.2015.7111611\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2015 Asian Conference on Defence Technology (ACDT)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ACDT.2015.7111611","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Applying multivariate data analysis to identify key parameters of bi-directional attack flows
Flow export data has been intensively used in anomaly-based intrusion detection systems; however, we have limited understanding of the characteristics of bi-directional flow parameters with respect to the types of network attacks. To recognize the relationship between traffic parameters, we propose an empirical model which analyzes synthetically generated five network attacks within a closed environment, and perform exploratory data analysis using principal component analysis. The experimental results have identified relevant key parameters for selecting good candidates for intrusion detection analysis. The analysis capabilities of bi-directional flow parameters and their characteristics persisting in selected attacks have been diagnosed and revealed.