Multi Scale Time Series Prediction for Intrusion Detection

نویسنده

  • K. Duraiswamy
چکیده

We propose an anomaly-based network intrusion detection system, which analyzes traffic features to detect anomalies. The proposed system can be used both in online as well as off-line mode for detecting deviations from the expected behavior. Although our approach uses network packet or flow data, it is general enough to be adaptable for use with any other network variable, which may be used as a signal for anomaly detection. It differs from most existing approaches in its use of wavelet transform for generating different time scales for a signal and using these scales as an input to a two-stage neural network predictor. The predictor predicts the expected signal value and labels considerable deviations from this value as anomalies. The primary contribution of our work would be to empirically evaluate the effectiveness of multi resolution analysis as an input to neural network prediction engine specifically for the purpose of intrusion detection. The role of Intrusion Detection Systems (IDSs), as special-purpose devices to detect anomalies and attacks in a network, is becoming more important. First, anomaly-based methods cannot achieve an outstanding performance without a comprehensive labeled and up-to-date training set with all different attack types, which is very costly and time-consuming to create if not impossible. Second, efficient and effective fusion of several detection technologies becomes a big challenge for building an operational hybrid intrusion detection system. Keyword: Anomaly Detection, Two-Stage Neural Network Predictor, Multi-Resolution Analysis

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

MHIDCA: Multi Level Hybrid Intrusion Detection and Continuous Authentication for MANET Security

Mobile ad-hoc networks have attracted a great deal of attentions over the past few years. Considering their applications, the security issue has a great significance in them. Security scheme utilization that includes prevention and detection has the worth of consideration. In this paper, a method is presented that includes a multi-level security scheme to identify intrusion by sensors and authe...

متن کامل

Vehicle's velocity time series prediction using neural network

This paper presents the prediction of vehicle's velocity time series using neural networks. For this purpose, driving data is firstly collected in real world traffic conditions in the city of Tehran using advance vehicle location devices installed on private cars. A multi-layer perceptron network is then designed for driving time series forecasting. In addition, the results of this study are co...

متن کامل

Mining Frequency Content of Network Traffic for Intrusion

This paper presents a novel network intrusion detection method that searches for frequency patterns within the time series created by network traffic signals. The new strategy is aimed for, but not limited to, detecting DOS and Probe attacks. The detection method is based on the observation that such kind of attacks are most likely manipulated by scripted code, which often result in periodicity...

متن کامل

Pervasive white and colored noise removing from magnetotelluric time series

Magnetotellurics is an exploration method which is based on measurement of natural electric and magnetic fields of the Earth and is increasingly used in geological applications, petroleum industry, geothermal sources detection and crust and lithosphere studies. In this work, discrete wavelet transform of magnetotelluric signals was performed. Discrete wavelet transform decomposes signals into c...

متن کامل

GPU Implementation of Parallel Support Vector Machine Algorithm with Applications to Intruder Detection

The network anomaly detection technology based on support vector machine (SVM) can efficiently detect unknown attacks or variants of known attacks, however, it cannot be used for detection of large-scale intrusion scenarios due to the demand of computational time. The graphics processing unit (GPU) has the characteristics of multi-threads and powerful parallel processing capability. Based on th...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2014