2011
DOI: 10.4236/jis.2011.24016
|View full text |Cite
|
Sign up to set email alerts
|

Anomalous Network Packet Detection Using Data Stream Mining

Abstract: In recent years, significant research has been devoted to the development of Intrusion Detection Systems (IDS) able to detect anomalous computer network traffic indicative of malicious activity. While signature-based IDS have proven effective in discovering known attacks, anomaly-based IDS hold the even greater promise of being able to automatically detect previously undocumented threats. Traditional IDS are generally trained in batch mode, and therefore cannot adapt to evolving network data streams in real ti… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
7
0

Year Published

2012
2012
2024
2024

Publication Types

Select...
3
3
1

Relationship

1
6

Authors

Journals

citations
Cited by 12 publications
(7 citation statements)
references
References 4 publications
0
7
0
Order By: Relevance
“…For all days except for Thursday, the StreamPreDeCon clustering algorithm achieved the highest detection rates with the least false positive rates for the Shell-code attacks averaging 94 percent with the Because the CLET attacks are meant to fool the anomaly-based IDS through polymorphic techniques, these attacks cause the lowest acceptable detection rates. Despite the slightly poor detection of CLET attacks, the StreamPreDeCon IDS on average had mostly higher sensitivity values with substantially lower false positive rates than the results of [10].…”
Section:   mentioning
confidence: 80%
See 2 more Smart Citations
“…For all days except for Thursday, the StreamPreDeCon clustering algorithm achieved the highest detection rates with the least false positive rates for the Shell-code attacks averaging 94 percent with the Because the CLET attacks are meant to fool the anomaly-based IDS through polymorphic techniques, these attacks cause the lowest acceptable detection rates. Despite the slightly poor detection of CLET attacks, the StreamPreDeCon IDS on average had mostly higher sensitivity values with substantially lower false positive rates than the results of [10].…”
Section:   mentioning
confidence: 80%
“…Tested on a dataset comprised of normal packets from the first week of the DARPA '99 intrusion detection evaluation dataset and various types of malicious traffic from [1], the IDS based on StreamPreDeCon out-performed previous stream-based IDS [10] using the same dataset in all days except for one day. For these days, the anomalous packet detection of the StreamPreDeCon IDS improved the sensitivity rate of the DenStream based IDS from 30% -90% to 60% -94% and reduced the false positive rates from a high of 20% to between 1% and 10%.…”
Section: Discussionmentioning
confidence: 99%
See 1 more Smart Citation
“…The first process was traffic features selection, which selects proper features for system input. In the second process, we construct a homogeneous group by adopting the micro-clustering approach in Denstream [12]. The stream traffic was grouped according to the minimal distance to existing group profile and processed further when the group size is adequate for group-based classification input.…”
Section: B Research Designmentioning
confidence: 99%
“…Aggregate traffic features are commonly proposed to detect traffic anomaly, such as [6,7,8,9]. By the used of machine learning such as clustering method, the system can determine clusters of traffic such in [10,11,12], but the output has no concern about the types of an anomaly of the formed groups. The classification has better used in security system such in [13,14,15], a system can single out the specific anomalous packet or connection and determine the known types of anomaly.…”
Section: Introductionmentioning
confidence: 99%