首页> 外文会议>2017 Intelligent Systems Conference >A heuristic attack detection approach using the “least weighted” attributes for cyber security data
【24h】

A heuristic attack detection approach using the “least weighted” attributes for cyber security data

机译:一种启发式攻击检测方法,使用“最小加权”属性处理网络安全数据

获取原文
获取原文并翻译 | 示例

摘要

The continuous advance in recent cloud-based computer networks has generated a number of security challenges associated with intrusions in network systems. With the exponential increase in the volume of network traffic data, involvement of humans in such detection systems is time consuming and a non-trivial problem. Secondly, network traffic data tends to be highly dimensional, comprising of numerous features and attributes, making classification challenging and thus susceptible to the curse of dimensionality problem. Given such scenarios, the need arises for dimensional reduction, feature selection, combined with machine-learning techniques in the classification of such data. Therefore, as a contribution, this paper seeks to employ data mining techniques in a cloud-based environment, by selecting appropriate attributes and features with the least importance in terms of weight for the classification. Often the standard is to select features with better weights while ignoring those with least weights. In this study, we seek to find out if we can make prediction using those features with least weights. The motivation is that adversaries use stealth to hide their activities from the obvious. The question then is, can we predict any stealth activity of an adversary using the least observed attributes? In this particular study, we employ information gain to select attributes with the lowest weights and then apply machine learning to classify if a combination, in this case, of both source and destination ports are attacked or not. The motivation of this investigation is if attributes that are of least importance can be used to predict if an attack could occur. Our preliminary results show that even when the source and destination port attributes are used in combination with features with the least weights, it is possible to classify such network traffic data and predict if an attack will occur or not.
机译:最近基于云的计算机网络的不断发展已经带来了与网络系统入侵相关的许多安全挑战。随着网络流量数据量的成倍增长,人类参与这种检测系统既费时又是一个不小的问题。其次,网络流量数据往往具有很高的维数,包括许多特征和属性,使分类具有挑战性,因此容易遭受维数问题的困扰。在这种情况下,就需要进行降维,特征选择以及在此类数据分类中结合机器学习技术的需求。因此,作为一种贡献,本文试图通过选择适当的属性和特征(在权重方面对重要性的重要性最低)来在基于云的环境中采用数据挖掘技术。通常,标准是选择权重更好的特征,而忽略权重最小的特征。在本研究中,我们试图找出是否可以使用权重最小的那些特征进行预测。动机是对手利用隐身来掩盖明显的活动。那么问题是,我们可以使用观察最少的属性来预测对手的任何隐身活动吗?在此特定研究中,我们利用信息增益来选择权重最低的属性,然后应用机器学习对源端口和目标端口的组合(在这种情况下)是否受到攻击进行分类。进行此调查的动机是,是否可以使用最不重要的属性来预测是否可能发生攻击。我们的初步结果表明,即使将源和目标端口属性与权重最小的功能结合使用,也可以对此类网络流量数据进行分类,并预测是否会发生攻击。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号