2014
DOI: 10.1016/j.knosys.2014.06.018
|View full text |Cite
|
Sign up to set email alerts
|

Autonomic intrusion detection: Adaptively detecting anomalies over unlabeled audit data streams in computer networks

Abstract: In this work, we propose a novel framework of autonomic intrusion detection that fulfills online and adaptive intrusion detection over unlabeled HTTP traffic streams in computer networks. The framework holds potential for self-managing: self-labeling, self-updating and self-adapting. Our framework employs the Affinity Propagation (AP) algorithm to learn a subject's behaviors through dynamical clustering of the streaming data. It automatically labels the data and adapts to normal behavior changes while identifi… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
36
0

Year Published

2016
2016
2021
2021

Publication Types

Select...
6
3

Relationship

1
8

Authors

Journals

citations
Cited by 86 publications
(36 citation statements)
references
References 42 publications
0
36
0
Order By: Relevance
“…In both the ls-and sl-methods, the extracted traffic data is used for training a baseline model. Although some auto-labeling techniques based on machine learning theory [21] can be also used to correct/prevent human errors, such techniques needs higher processing cost than time-periodic packet sampling. The proposed methods in this paper enable us to correct/prevent human errors with lower processing cost.…”
Section: Procedures Of Proposed Methodsmentioning
confidence: 99%
“…In both the ls-and sl-methods, the extracted traffic data is used for training a baseline model. Although some auto-labeling techniques based on machine learning theory [21] can be also used to correct/prevent human errors, such techniques needs higher processing cost than time-periodic packet sampling. The proposed methods in this paper enable us to correct/prevent human errors with lower processing cost.…”
Section: Procedures Of Proposed Methodsmentioning
confidence: 99%
“…The analysis of subject behavior over the unlabeled HTTP streams is required in IDS. Wang et al [22] employed Affinity Propagation (AP) algorithm to learn the subject's behavior in dynamic clustering. The data classification, human interaction, deficiency in labeled data were the important issues in NIDS.…”
Section: Related Workmentioning
confidence: 99%
“…Since attackers have become more sophisticated and utilized more advanced web attack toolkits, the detection model might become obsolete and outdated, incapable of detecting the latest malicious queries in web attacks. Previous adaptive attack detection methods [16][17][18] are designed for network intrusions and are not applicable to web attacks. A practical solution for keeping the web attack detection model constantly updated is to incorporate the latest important queries, including informative benign queries and representative malicious queries.…”
Section: Introductionmentioning
confidence: 99%