首页> 外文会议>Systems and Information Engineering Design Symposium >Comparing unsupervised learning approaches to detect network intrusion using NetFlow data
【24h】

Comparing unsupervised learning approaches to detect network intrusion using NetFlow data

机译:比较无监督的学习方法来使用NetFlow数据检测网络侵扰

获取原文

摘要

Networks are vulnerable to costly attacks. Thus, the ability to detect these intrusions early on and minimize their impact is imperative to the financial security and reputation of an institution. There are two mainstream systems of intrusion detection (IDS), signature-based and anomaly-based IDS. Signature-based IDS identify intrusions by referencing a database of known identity, or signature, for each of the previous intrusion events. Anomaly-based IDS attempt to identify intrusions by referencing a baseline or learned patterns of normal behavior. Under this approach, deviations from the baseline are considered intrusions. We assume this type of behavior is rare and distinguishable from normal activity. Our research investigates unsupervised techniques for anomaly-based network intrusion detection. For this research, we use real-time traffic data from University of Virginia network. We evaluate the performance between Local Outlier Factor (LOF) and Isolation Forest (iForest) by probing the similarities and differences between the result of each approach. Distribution plots show there is a greater variation of attributes in anomalies identified by iForest than those anomalies identified by LOF. Furthermore, iForest results are more distinctive from all data than the LOF results. With the assumptions that anomalies are points that are rare and distinctive, we find that iForest performs well in identifying anomalies compared to LOF.
机译:网络容易受到昂贵的攻击。因此,早期检测这些入侵的能力并最大限度地减少其影响是机构的财务安全和声誉所必需的。有两个主流的入侵检测系统(IDS),基于签名和基于异常的ID。基于签名的IDS通过引用已知标识或签名的数据库来为每个先前的入侵事件识别侵入。基于异常的ID,尝试通过引用基线或学习的正常行为模式来识别入侵。在这种方法下,与基线的偏差被认为是入侵。我们假设这种类型的行为是罕见的,与正常活动有区别。我们的研究研究了基于异常的网络入侵检测的无监督技术。对于这项研究,我们使用弗吉尼亚大学网络的实时交通数据。通过探测每个方法结果之间的相似性和差异,我们评估本地异常因素因子(LOF)和隔离林(IFOREST)之间的性能。分布图显示了IFOREST鉴定的异常中的属性变异,而不是LOF所识别的那些异常。此外,IFOSEST结果与所有数据都比LOF结果更独特。假设异常是罕见和独特的点,我们发现,与LOF相比,IFOREST在识别异常时表现良好。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号