首页> 外文会议>European Conference on Information Warfare and Security >Time Correlated Anomaly Detection Based on Inferences
【24h】

Time Correlated Anomaly Detection Based on Inferences

机译:基于推论的时间相关异常检测

获取原文

摘要

Anomaly detection techniques are used to find the presence of anomalous activities in a network by comparing traffic data activities against a "normal" baseline. Although it has several advantages which include detection of "zero-day" attacks, the question surrounding absolute definition of systems deviations from its "normal" behaviour is important to reduce the number of false positives in the system. This study proposes a novel multi-agent network-based framework known as Statistical model for Correlation and Detection (SCoDe), an anomaly detection framework that looks for time-correlated anomalies by leveraging statistical properties of a large network; monitoring the rate of events occurrence based on their intensity. SCoDe is an instantaneous learning-based anomaly detector, practically shifting away from the conventional technique of having a training phase prior to detection. It does acquire its training using the improved extension of Exponential Weighted Moving Average (EWMA) which is proposed in this study. SCoDe does not require any previous knowledge of the network traffic, or network administrators chosen reference window as normal but effectively builds upon the statistical properties from different attributes of the network traffic, to correlate undesirable deviations in order to identify abnormal patterns. The approach is generic as it can be easily modified to fit particular types of problems, with a predefined attribute, and it is highly robust because of the proposed statistical approach. The proposed framework was targeted to detect attacks that increase the number of activities on the network server, examples which include Distributed Denial of Service (DDoS) and, flood and flash-crowd events. This paper provides a mathematical foundation for SCoDe, describing the specific implementation and testing of the approach based on a network log file generated from the cyber range simulation experiment of the industrial partner of this project.
机译:通过将交通数据活动与“正常”基线进行比较,使用异常检测技术来找到网络中的异常活动。虽然它具有若干优点,包括检测“零日”攻击,但周围的系统偏离的问题与“正常”行为的偏差是重要的,这对于减少系统中的误报的数量是重要的。本研究提出了一种称为相关性和检测(SCODE)的统计模型的新型多代理网络的框架,通过利用大网络的统计特性寻找时间相关异常的异常检测框架;根据其强度监测事件发生率。 SCODE是一种基于瞬时的学习的异常检测器,几乎远离检测到之前具有训练阶段的传统技术。它确实使用本研究提出的指数加权移动平均(EWMA)的改进扩展来获取其培训。 SCODE不需要以前的网络流量知识,或者网络管理员选择参考窗口作为正常但是有效地构建网络流量的不同属性的统计特性,以相关的偏差以识别异常模式。该方法是通用的,因为它可以很容易地修改以适应特定类型的问题,具有预定义的属性,并且由于所提出的统计方法,它是高度稳健的。所提出的框架是针对检测增加网络服务器上活动数量的攻击,其中包括分布式拒绝服务(DDOS)和,洪水和闪存 - 人群事件的示例。本文提供了一个SCODE的数学基础,描述的具体实施,并根据本项目的工业合作伙伴的网络范围内的模拟实验中产生的网络日志文件的方法进行测试。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号