Towards an Unsupervised Method for Network Anomaly Detection in Large Datasets
نویسندگان
چکیده
In this paper, we present an e↵ective tree based subspace clustering technique (TreeCLUS) for finding clusters in network intrusion data and for detecting known as well as unknown attacks without using any labelled tra c or signatures or training. To establish its e↵ectiveness in finding appropriate number of clusters, we perform a cluster stability analysis. We also introduce an e↵ective cluster labelling technique (CLUSLab) to label each cluster based on the stable cluster set obtained from TreeCLUS. CLUSLab is a multi-objective technique that employs an ensemble approach for labelling each stable cluster generated by TreeCLUS to achieve high detection rate. We also introduce an e↵ective unsupervised feature clustering technique to identify the dominating feature set from each cluster. We evaluate the performance of both TreeCLUS and CLUSLab in terms of several real world intrusion datasets to identify known as well as unknown attacks and find that results are excellent. 2 M. H. Bhuyan, D. K. Bhattacharyya, J. K. Kalita
منابع مشابه
BotOnus: an online unsupervised method for Botnet detection
Botnets are recognized as one of the most dangerous threats to the Internet infrastructure. They are used for malicious activities such as launching distributed denial of service attacks, sending spam, and leaking personal information. Existing botnet detection methods produce a number of good ideas, but they are far from complete yet, since most of them cannot detect botnets in an early stage ...
متن کاملA Comparative Evaluation of Unsupervised Anomaly Detection Algorithms for Multivariate Data.
Anomaly detection is the process of identifying unexpected items or events in datasets, which differ from the norm. In contrast to standard classification tasks, anomaly detection is often applied on unlabeled data, taking only the internal structure of the dataset into account. This challenge is known as unsupervised anomaly detection and is addressed in many practical applications, for exampl...
متن کاملTowards combining ontology matchers via anomaly detection
In ontology alignment, there is no single best performing matching algorithm for every matching problem. Thus, most modern matching systems combine several base matchers and aggregate their results into a final alignment. This combination is often based on simple voting or averaging, or uses existing matching problems for learning a combination policy in a supervised setting. In this paper, we ...
متن کاملAnomaly Detection Using SVM as Classifier and Decision Tree for Optimizing Feature Vectors
Abstract- With the advancement and development of computer network technologies, the way for intruders has become smoother; therefore, to detect threats and attacks, the importance of intrusion detection systems (IDS) as one of the key elements of security is increasing. One of the challenges of intrusion detection systems is managing of the large amount of network traffic features. Removing un...
متن کاملA Comparative Study on Outlier Removal from a Large-scale Dataset using Unsupervised Anomaly Detection
Outlier removal from training data is a classical problem in pattern recognition. Nowadays, this problem becomes more important for large-scale datasets by the following two reasons: First, we will have a higher risk of “unexpected” outliers, such as mislabeled training data. Second, a large-scale dataset makes it more difficult to grasp the distribution of outliers. On the other hand, many uns...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
- Computing and Informatics
دوره 33 شماره
صفحات -
تاریخ انتشار 2014