...
首页> 外文期刊>Computers & Security >Data preprocessing for anomaly based network intrusion detection: A review
【24h】

Data preprocessing for anomaly based network intrusion detection: A review

机译:基于异常的网络入侵检测的数据预处理:综述

获取原文
获取原文并翻译 | 示例
           

摘要

Data preprocessing is widely recognized as an important stage in anomaly detection. This paper reviews the data preprocessing techniques used by anomaly-based network intrusion detection systems (NIDS), concentrating on which aspects of the network traffic are analyzed, and what feature construction and selection methods have been used. Motivation for the paper comes from the large impact data preprocessing has on the accuracy and capability of anomaly-based NIDS. The review finds that many NIDS limit their view of network traffic to the TCP/IP packet headers. Time-based statistics can be derived from these headers to detect network scans, network worm behavior, and denial of service attacks. A number of other NIDS perform deeper inspection of request packets to detect attacks against network services and network applications. More recent approaches analyze full service responses to detect attacks targeting clients. The review covers a wide range of NIDS, highlighting which classes of attack are detectable by each of these approaches.Data preprocessing is found to predominantly rely on expert domain knowledge for identifying the most relevant parts of network traffic and for constructing the initial candidate set of traffic features. On the other hand, automated methods have been widely used for feature extraction to reduce data dimensionality, and feature selection to find the most relevant subset of features from this candidate set. The review shows a trend toward deeper packet inspection to construct more relevant features through targeted content parsing. These context sensitive features are required to detect current attacks.
机译:数据预处理被广泛认为是异常检测的重要阶段。本文回顾了基于异常的网络入侵检测系统(NIDS)所使用的数据预处理技术,着重分析了网络流量的哪些方面,以及使用了哪些功能构造和选择方法。本文的动机来自于数据预处理对基于异常的NIDS的准确性和功能的巨大影响。审查发现,许多NIDS将其网络流量视图限制为TCP / IP数据包头。可以从这些标头中获取基于时间的统计信息,以检测网络扫描,网络蠕虫行为和拒绝服务攻击。其他许多NIDS对请求数据包进行更深入的检查,以检测对网络服务和网络应用程序的攻击。最近的方法分析完整服务响应以检测针对客户端的攻击。审查涵盖了各种NIDS,重点介绍了每种方法都可以检测到哪些攻击类别。数据预处理主要依靠专家领域的知识来识别网络流量中最相关的部分并构建初始的候选集交通功能。另一方面,自动化方法已广泛用于特征提取以减少数据维数,并进行特征选择以从此候选集中找到最相关的特征子集。审查显示了一种趋势,即更深入的数据包检查以通过目标内容解析来构建更多相关功能。这些上下文相关功能是检测当前攻击所必需的。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号