首页> 外文会议>IEEE International Workshop on Measurements and Networking >A real time unsupervised NIDS for detecting unknown and encrypted network attacks in high speed network
【24h】

A real time unsupervised NIDS for detecting unknown and encrypted network attacks in high speed network

机译:用于检测高速网络中未知和加密网络攻击的实时无监督的NID

获取原文

摘要

Previously, Network Intrusion Detection Systems (NIDS) detected intrusions by comparing the behaviour of the network to the pre-defined rules or pre-observed network traffic, which was expensive in terms of both cost and time. Unsupervised machine learning techniques have overcome these issues and can detect unknown and complex attacks within normal or encrypted communication without any prior knowledge. NIDS monitors bytes, packets and network flow to detect intrusions. It is nearly impossible to monitor the payload of all packets in a high-speed network. On the other hand, the content of packets does not have sufficient information to detect a complex attack. Since the rate of attacks within encrypted communication is increasing and the content of encrypted packets is not accessible to NIDS, it has been suggested to monitor network flows. As most network intrusions spread within the network very quickly, in this paper we will propose a new real-time unsupervised NIDS for detecting new and complex attacks within normal and encrypted communications. To achieve having a real-time NIDS, the proposed model should capture live network traffic from different sensors and analyse specific metrics such as number of bytes, packets, network flows, and the time explicitly and implicitly, of packets and network flows, in the different resolutions. The NIDS will flag the time slot as an anomaly if any of those metrics passes the threshold, and it will send the time slot to the first engine. The first engine clusters different layers and dimensions of the network's behaviour and correlates the outliers to purge the intrusions from normal traffic. Detecting network attacks, which produce a huge amount of network traffic (e.g. DOS, DDOS, scanning) was the aim of proposing the first engine. Analysing statistics of network flows increases the feasibility of detecting intrusions within encrypted communications. The aim of proposing the second engine is to conduct a deeper analysis a- d correlate the traffic and behaviour of Bots (current attackers) during DDOS attacks to find the Bot-Master.
机译:以前,通过将网络的行为与预定义的规则或预先观察到的网络流量进行比较来检测入侵的网络入侵检测系统(NID),这在成本和时间方面都是昂贵的。无监督的机器学习技术克服了这些问题,并且可以在没有任何先前知识的情况下检测正常或加密通信内的未知和复杂攻击。 NIDS监控字节,数据包和网络流以检测入侵。几乎不可能在高速网络中监视所有数据包的有效载荷。另一方面,数据包的内容没有足够的信息来检测复杂的攻击。由于加密通信中的攻击率越来越大,并且NID无法访问加密数据包的内容,因此已经建议监视网络流。由于大多数网络入侵很快在网络内传播,本文将提出一个新的实时无监督NID,用于检测正常和加密通信内的新的和复杂攻击。为了实现具有实时的NID,所提出的模型应该从不同的传感器中捕获实时网络流量,并分析特定度量,例如字节数,数据包,网络流量,并明确地,隐含地,数据包和网络流程不同的决议。如果这些指标传递阈值,则NIDS将使时隙作为异常,并且它将将时隙发送到第一引擎。第一个发动机群集网络行为的不同层和尺寸,并将异常值相关联以从正常流量中清除入侵。检测网络攻击,产生大量网络流量(例如DOS,DDO,扫描)是提出第一发动机的目的。分析网络流统计数据增加了检测加密通信内的入侵的可行性。提出第二发动机的目的是进行更深入的分析A-D在DDOS攻击期间,在DDOS攻击期间相关联的流量和行为,以找到机器人。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号