首页> 外文会议>International Wireless Communications and Mobile Computing Conference >Coping with 0-day attacks through Unsupervised Network Intrusion Detection
【24h】

Coping with 0-day attacks through Unsupervised Network Intrusion Detection

机译:通过无监督网络入侵检测应对0天攻击

获取原文

摘要

Traditional Network Intrusion Detection Systems (NIDSs) rely on either specialized signatures of previously seen attacks, or on expensive and difficult to produce labeled traffic datasets for profiling and training. Both approaches share a common downside: they require the knowledge provided by an external agent, either in terms of signatures or as normal-operation profiles. In this paper we describe UNIDS, an Unsupervised NIDS capable of detecting 0-day attacks, i.e., network attacks for which no signature is yet available, without using any kind of signatures, labeled traffic, or training. UNIDS uses a novel unsupervised outliers detection approach based on Sub-Space Clustering and Multiple Evidence Accumulation techniques to pin-point different kinds of network intrusions and attacks such as DoS/DDoS, probing attacks, propagation of worms, buffer overflows, illegal access to network resources, etc. In this paper we make the strong point that the de-facto approach for NIDS, namely the application of rule-based detection techniques, can be highly harmful for the protected network in case of 0-day attacks. In contrast, we show how UNIDS can work as a complementary system to current NIDS to detect the occurrence of previously unseen attacks. For doing so, we compare the performance of a standard rule-based NIDS against UNIDS to detect 0-day attacks in the well-known KDD99 dataset. In addition, we also compare the performance of UNIDS against other popular unsupervised detection techniques to detect attacks in traces collected at two operation networks.
机译:传统的网络入侵检测系统(NIDS)依赖于以前见过的攻击的专门特征,或者依赖于昂贵且难以生成标记的流量数据集进行概要分析和训练。两种方法都有一个共同的缺点:它们需要外部代理提供的知识,包括签名或正常操作配置文件。在本文中,我们描述了UNIDS,这是一种无监督的NIDS,能够检测0天攻击,即尚无可用签名的网络攻击,而无需使用任何类型的签名,标记流量或训练。 UNIDS使用基于子空间聚类和多证据累积技术的新颖的无监督异常值检测方法来查明不同类型的网络入侵和攻击,例如DoS / DDoS,探测攻击,蠕虫传播,缓冲区溢出,对网络的非法访问本文强调了NIDS的事实方法,即基于规则的检测技术的应用,可能在受到0天攻击的情况下对受保护的网络产生极大的危害。相比之下,我们展示了UNIDS如何作为当前NIDS的补充系统来检测以前未见的攻击的发生。为此,我们将基于规则的标准NIDS与UNIDS的性能进行比较,以检测著名的KDD99数据集中的0天攻击。此外,我们还将UNIDS的性能与其他流行的无监督检测技术进行比较,以检测在两个操作网络上收集的跟踪中的攻击。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号