2015
DOI: 10.1007/s11235-015-0017-6
|View full text |Cite
|
Sign up to set email alerts
|

An unsupervised approach for traffic trace sanitization based on the entropy spaces

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
6
0

Year Published

2018
2018
2022
2022

Publication Types

Select...
4
1
1

Relationship

0
6

Authors

Journals

citations
Cited by 10 publications
(6 citation statements)
references
References 30 publications
0
6
0
Order By: Relevance
“…Real traffic, on the other hand, should be stripped of confidential data, carefully labeled and rigorously sanitized in order to meet the established criteria. Several studies contributed approaches to sanitization of traffic [13,25,47,100] in order to not only label embedded attacks and benign traces, but also to pre-select the most representative instances. Automated sanitization uses such methods as entropy analysis and signature-based attack labeling, which may result in erroneous ground-truth.…”
Section: Representative Datasets and Ground Truthmentioning
confidence: 99%
“…Real traffic, on the other hand, should be stripped of confidential data, carefully labeled and rigorously sanitized in order to meet the established criteria. Several studies contributed approaches to sanitization of traffic [13,25,47,100] in order to not only label embedded attacks and benign traces, but also to pre-select the most representative instances. Automated sanitization uses such methods as entropy analysis and signature-based attack labeling, which may result in erroneous ground-truth.…”
Section: Representative Datasets and Ground Truthmentioning
confidence: 99%
“…In [23], the authors propose techniques for instrumenting network warfare competitions to collect scientifically valid labeled datasets, which otherwise would be resource-intensive. Similarly, Velarde-Alvarado et al [11] remark the scarcity of suitable datasets for AIDS development and propose a semi-automated process for the sanitization of the traffic captured based on the entropy of embedded traffic flows. This enables the collection of large volumes of data without excessive resource consumption in terms of manual supervision or computational resources.…”
Section: Related Workmentioning
confidence: 99%
“…However, the workload associated with this process grows linearly with the size of the trace. And, although unsupervised sanitization approaches have been suggested (e.g., analysis of entropy [11], or filtering known-attacks with signature-based IDS [12]), manual supervision may be unavoidable in order to discover attacks (e.g., 0-day) unnoticed by fully automated methods [13], [14].…”
Section: Introductionmentioning
confidence: 99%
“…In order to characterise and detect DDoS attacks, they propose the use of machine learning techniques along with entropy-based features, since these features measure information uncertainties and thus can show changes in traffic patterns. This work is related to [13] where the authors claim that the accuracy and reliability of anomaly-based network intrusion detection systems depend on the quality of the data used to build normal behaviour profiles; thus, the authors use entropy measurements and machine learning techniques such as clustering and classification in order sanitise network logs to improve the quality of these profiles.…”
Section: Related Workmentioning
confidence: 99%