首页> 外文会议>IEEE International Conference on Fuzzy Systems >Automatic Detection of Computer Network Traffic Anomalies based on Eccentricity Analysis
【24h】

Automatic Detection of Computer Network Traffic Anomalies based on Eccentricity Analysis

机译:基于偏心分析的计算机网络流量异常自动检测

获取原文
获取外文期刊封面目录资料

摘要

In this paper, we propose an approach to automatic detection of attacks on computer networks using data that combine the traffic generated with 'live' intra-cloud virtual-machine (VM) migration. The method used in this work is the recently introduced typicality and eccentricity data analytics (TEDA) framework. We compare the results of applying TEDA with the traditionally used methods such as statistical analysis, such as k-means clustering. One of the biggest challenges in computer network analysis using statistical or numerical methods is the fact that the protocols information is composed of integer/string values and, thus, not easy to handle by traditional pattern recognition methods that deal with real values. In this study we consider as features the tuple {IP source, IP destination, Port source and Port destination} extracted from the network flow data in addition to the traditionally used real values that represent the number of packets per time or quantity of bytes per time. Using entropy of the IP data helps to convert the integer raw data into real valued signatures. The proposed solution permit to build a real-time anomaly detection system and reduce the number of information that is necessary for evaluation. In general, the systems based on traffic are fast and are used in real time but they do not produce good results in attacks that produce a flow hidden within the background traffic or within a high traffic that is produced by other application. We validate our approach an a dataset which includes attacks on the network port scan (NPS) and network scan (NS) that permit hidden flow within the normal traffic and see this attacks together with live migration which produces a higher traffic flow.
机译:在本文中,我们提出了一种使用与云内虚拟机(VM)迁移产生的流量组合的数据来自动检测计算机网络攻击的方法。本工作中使用的方法是最近引入的典型性和偏心数据分析(TEDA)框架。我们将TEDA的结果与传统使用的方法进行比较,例如统计分析,例如K-means聚类。计算机网络分析中使用统计或数值方法的最大挑战之一是协议信息由整数/字符串值组成,因此不容易处理传统的模式识别方法,这些方法处理真实值。在本研究中,我们认为除了传统使用的实际值之外,从网络流数据中提取的元组{IP源,IP目的地,端口源和端口目的地}除了表示每个时间的数据包数或每次数量的字节数之外,还可以从网络流数据中提取。使用IP数据的熵有助于将整数原始数据转换为真实值的签名。所提出的解决方案允许建立实时异常检测系统,并减少评估所需的信息数量。通常,基于流量的系统是快速的,并且实时使用,但它们不会产生良好的攻击结果,在后台流量或其他应用程序产生的高流量中产生隐藏的流程。我们验证我们的方法是一个数据集,包括对网络端口扫描(NPS)和网络扫描(NS)攻击的数据集,可允许在正常流量内的隐藏流程,并将此攻击与实时迁移一起产生,这会产生更高的流量流量。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号