【24h】

Network Anomaly Detection Using Co-clustering

机译:使用共聚类网络异常检测

获取原文
获取外文期刊封面目录资料

摘要

Early Internet architecture design goals did not put security as a high priority. However, today Internet security is a quickly growing concern. The prevalence of Internet attacks has increased significantly, but still the challenge of detecting such attacks generally falls on the end hosts and service providers, requiring system administrators to detect and block attacks on their own. In particular, as social networks have become central hubs of information and communication, they are increasingly the target of attention and attacks. This creates a challenge of carefully distinguishing malicious connections from normal ones. Previous work has shown that for a variety of Internet attacks, there is a small subset of connection measurements that are good indicators of whether a connection is part of an attack or not. In this paper we look at the effectiveness of using two different co-clustering algorithms to both cluster connections as well as mark which connection measurements are strong indicators of what makes any given cluster anomalous relative to the total data set. We run experiments with these co-clustering algorithms on the KDD 1999 Cup data set. In our experiments we find that soft co-clustering, running on samples of data, finds consistent parameters that are strong indicators of anomalous detections and creates clusters, that are highly pure. When running hard co-clustering on the full data set (over 100 runs), we on average have one cluster with 92.44% attack connections and the other with 75.84% normal connections. These results are on par with the KDD 1999 Cup winning entry, showing that co-clustering is a strong, unsupervised method for separating normal connections from anomalous ones. Finally, we believe that the ideas presented in this work may inspire research for anomaly detection in social networks, such as identifying spammers and fraudsters.
机译:早期互联网架构设计目标并没有将安全性作为高优先级。然而,今天互联网安全性很快就会受到兴高采烈。互联网攻击的普遍性显着增加,但仍然仍然是检测此类攻击的挑战通常落在最终主机和服务提供商上,要求系统管理员自己检测和阻止攻击。特别是,随着社交网络已成为信息和沟通的中心枢纽,它们越来越多地是关注和攻击的目标。这造成了仔细与普通的恶意连接挑战。以前的工作表明,对于各种互联网攻击,存在一个小的连接测量子集,这是连接是否是攻击的一部分的良好指标。在本文中,我们将使用两个不同的共聚类算法与群集连接一起使用的有效性以及标记连接测量是强大的指示符,相对于总数据集对任何给定的群集产生异常。我们在KDD 1999 Cup数据集上使用这些共聚类算法进行实验。在我们的实验中,我们发现软的共同聚类,在数据样本上运行,发现一致的参数是异常检测的强大指标并产生群集,这是非常纯粹的。在全数据集(超过100个运行)上运行硬共计群时,我们平均有一个群集,攻击连接为92.44%,另一个阵列和其他正常连接。这些结果与KDD 1999杯杯获胜入场有关,表明共聚类是一种强大,无监督的方法,用于分离异常的正常连接。最后,我们认为这项工作中提出的想法可能会激发对社交网络中异常检测的研究,例如识别垃圾邮件发送者和欺诈者。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号