Tanjim Munir Dipon, Md. Shohrab Hossain, Husnu S. Narman
{"title":"通过异常报文识别检测网络入侵","authors":"Tanjim Munir Dipon, Md. Shohrab Hossain, Husnu S. Narman","doi":"10.1109/ITNAC50341.2020.9315029","DOIUrl":null,"url":null,"abstract":"Rule based intrusion detection depends on the attack signature database which has to be constantly updated, requiring time and efforts. Anomaly based intrusion detection through unsupervised methods does not require comparing with attack signatures. However, detecting anomalous behaviour is a complex task. In this paper, we have proposed an unsupervised approach for anomalous network traffic identification by combining dimensionality reduction with sub-space clustering. Our approach takes the attribute values from network traffics as input, performs principal component analysis on them, and then applies density-based clustering on each possible three dimensional sub-spaces to rank the outliers. Results show that our proposed approach detects a wide range of anomalous network session which included instances of intrusive sessions too. The evaluation of this approach showed significant accuracy and faster detection with a zero false negative rate, implying that no instance of the listed attacks went undetected.","PeriodicalId":131639,"journal":{"name":"2020 30th International Telecommunication Networks and Applications Conference (ITNAC)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2020-11-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":"{\"title\":\"Detecting Network Intrusion through Anomalous Packet Identification\",\"authors\":\"Tanjim Munir Dipon, Md. Shohrab Hossain, Husnu S. Narman\",\"doi\":\"10.1109/ITNAC50341.2020.9315029\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Rule based intrusion detection depends on the attack signature database which has to be constantly updated, requiring time and efforts. Anomaly based intrusion detection through unsupervised methods does not require comparing with attack signatures. However, detecting anomalous behaviour is a complex task. In this paper, we have proposed an unsupervised approach for anomalous network traffic identification by combining dimensionality reduction with sub-space clustering. Our approach takes the attribute values from network traffics as input, performs principal component analysis on them, and then applies density-based clustering on each possible three dimensional sub-spaces to rank the outliers. Results show that our proposed approach detects a wide range of anomalous network session which included instances of intrusive sessions too. The evaluation of this approach showed significant accuracy and faster detection with a zero false negative rate, implying that no instance of the listed attacks went undetected.\",\"PeriodicalId\":131639,\"journal\":{\"name\":\"2020 30th International Telecommunication Networks and Applications Conference (ITNAC)\",\"volume\":\"17 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2020-11-25\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"1\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2020 30th International Telecommunication Networks and Applications Conference (ITNAC)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ITNAC50341.2020.9315029\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2020 30th International Telecommunication Networks and Applications Conference (ITNAC)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ITNAC50341.2020.9315029","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Detecting Network Intrusion through Anomalous Packet Identification
Rule based intrusion detection depends on the attack signature database which has to be constantly updated, requiring time and efforts. Anomaly based intrusion detection through unsupervised methods does not require comparing with attack signatures. However, detecting anomalous behaviour is a complex task. In this paper, we have proposed an unsupervised approach for anomalous network traffic identification by combining dimensionality reduction with sub-space clustering. Our approach takes the attribute values from network traffics as input, performs principal component analysis on them, and then applies density-based clustering on each possible three dimensional sub-spaces to rank the outliers. Results show that our proposed approach detects a wide range of anomalous network session which included instances of intrusive sessions too. The evaluation of this approach showed significant accuracy and faster detection with a zero false negative rate, implying that no instance of the listed attacks went undetected.