A survey of network anomaly detection techniques

Slides:



Advertisements
Similar presentations
Applications of one-class classification
Advertisements

Loss-Sensitive Decision Rules for Intrusion Detection and Response Linda Zhao Statistics Department University of Pennsylvania Joint work with I. Lee,
Ziming Zhang, Yucheng Zhao and Yiwen Wan.  Introduction&Motivation  Problem Statement  Paper Summeries  Discussion and Conclusions.
Sensor-Based Abnormal Human-Activity Detection Authors: Jie Yin, Qiang Yang, and Jeffrey Junfeng Pan Presenter: Raghu Rangan.
Performance Evaluation of the Fuzzy ARTMAP for Network Intrusion Detection Nelcileno Araújo Ruy de Oliveira Ed’Wilson Tavares Ferreira Valtemir Nascimento.
An Overview of Machine Learning
IDS/IPS Definition and Classification
Report on Intrusion Detection and Data Fusion By Ganesh Godavari.
Unsupervised Intrusion Detection Using Clustering Approach Muhammet Kabukçu Sefa Kılıç Ferhat Kutlu Teoman Toraman 1/29.
Copyright 2002, Center for Secure Information Systems 1 Panel: Role of Data Mining in Cyber Threat Analysis Professor Sushil Jajodia Center for Secure.
Intrusion detection Anomaly detection models: compare a user’s normal behavior statistically to parameters of the current session, in order to find significant.
Intrusion Detection Systems By Ali Hushyar. What is an intrusion? Intrusion: “any action or set of actions that attempt to compromise the integrity, confidentiality.
Neural Technology and Fuzzy Systems in Network Security Project Progress Group 2: Omar Ehtisham Anwar Aneela Laeeq
Testing Intrusion Detection Systems: A Critic for the 1998 and 1999 DARPA Intrusion Detection System Evaluations as Performed by Lincoln Laboratory By.
Intrusion and Anomaly Detection in Network Traffic Streams: Checking and Machine Learning Approaches ONR MURI area: High Confidence Real-Time Misuse and.
Anomaly detection Problem motivation Machine Learning.
CS548 Spring 2015 Anomaly Detection Showcase Anomaly-based Network Intrusion Detection (A-NIDS) by Nitish Bahadur, Gulsher Kooner, Caitlin Kuhlman 1.
A Statistical Anomaly Detection Technique based on Three Different Network Features Yuji Waizumi Tohoku Univ.
Intrusion Detection Jie Lin. Outline Introduction A Frame for Intrusion Detection System Intrusion Detection Techniques Ideas for Improving Intrusion.
Masquerade Detection Mark Stamp 1Masquerade Detection.
IIT Indore © Neminah Hubballi
Improving Intrusion Detection System Taminee Shinasharkey CS689 11/2/00.
Anomaly detection with Bayesian networks Website: John Sandiford.
INTRUSION DETECTION INTRUSION DETECTION INTRUSION DETECTION INTRUSION DETECTION INTRUSION DETECTION INTRUSION DETECTION INTRUSION DETECTION INTRUSION DETECTION.
Intrusion Detection Using Hybrid Neural Networks Vishal Sevani ( )
A Data Mining Approach for Building Cost-Sensitive and Light Intrusion Detection Models PI Meeting - July, 2000 North Carolina State University Columbia.
Report on Intrusion Detection and Data Fusion By Ganesh Godavari.
1 Data Mining: Concepts and Techniques (3 rd ed.) — Chapter 12 — Jiawei Han, Micheline Kamber, and Jian Pei University of Illinois at Urbana-Champaign.
Automatic Detection of Emerging Threats to Computer Networks Andre McDonald.
Anomaly Detection.
NTU & MSRA Ming-Feng Tsai
Identifying “Best Bet” Web Search Results by Mining Past User Behavior Author: Eugene Agichtein, Zijian Zheng (Microsoft Research) Source: KDD2006 Reporter:
WHAT IS DATA MINING?  The process of automatically extracting useful information from large amounts of data.  Uses traditional data analysis techniques.
Approaches to Intrusion Detection statistical anomaly detection – threshold – profile based rule-based detection – anomaly – penetration identification.
Anomaly Detection Nathan Dautenhahn CS 598 Class Lecture March 3, 2011.
Introduction to Machine Learning, its potential usage in network area,
Anomaly Detection in Data Science
Experience Report: System Log Analysis for Anomaly Detection
Application Intrusion Detection
CSE 4705 Artificial Intelligence
Chapter 9 Intruders.
Sentiment analysis algorithms and applications: A survey
Intrusion Control.
Intrusion Detection Systems
Outlier Processing via L1-Principal Subspaces
Outline Introduction Characteristics of intrusion detection systems
Data Mining: Concepts and Techniques (3rd ed.) — Chapter 12 —
Source: Procedia Computer Science(2015)70:
BotCatch: A Behavior and Signature Correlated Bot Detection Approach
An Enhanced Support Vector Machine Model for Intrusion Detection
Dieudo Mulamba November 2017
Flavio Toffalini, Ivan Homoliak, Athul Harilal,
Roland Kwitt & Tobias Strohmeier
Outlier Discovery/Anomaly Detection
NET 412 Network Security protocols
Security Monitoring for Network Protocols and Applications
Learning with information of features
Chapter 9 Intruders.
Intrusion Detection Systems
Lecture 14: Anomaly Detection
Lecture 8: Intrusion Detection
Graph-based Security and Privacy Analytics via Collective Classification with Joint Weight Learning and Propagation Binghui Wang, Jinyuan Jia, and Neil.
Data Mining Anomaly Detection
Machine Learning – a Probabilistic Perspective
Jia-Bin Huang Virginia Tech
Kostas Kolomvatsos, Christos Anagnostopoulos
Modeling IDS using hybrid intelligent systems
Lecture 7: Intrusion Detection
Data Mining Anomaly Detection
Presentation transcript:

A survey of network anomaly detection techniques Journal of Network and Computer Applications 60 (2016) 19–31 A survey of network anomaly detection techniques Mohiuddin Ahmed Abdun Naser Mahmood Jiankun Hu School of Engineering and Information Technology, UNSW Canberra, ACT 2600, Australia Otto

Motivation Information and Communication Technology (ICT) ICT includes Social wellbeing Economic growth National security ICT includes Computers Mobile communication devices Networks Legitimate users People with malicious intent

Motivation

We must have tools to detect malicious intent Motivation We must have tools to detect malicious intent

The Survey Anomaly discussion Anomaly detection technique groups Types and detection Network attacks Mapping network attacks to anomalies Anomaly detection technique groups Classification based Statistical based Information theory based Clustering Based Datasets, evaluation and issues

Anomalies “An anomaly is an observation which deviates so much from other observations as to arouse suspicions that it was generated by a different mechanism”

Anomalies In a given dataset, anomalies may be Abnormal data Anomalous data Indicate significant but rare events Prompt critical actions to be taken Unusual network traffic patterns A change in service usage patterns A computer has been hacked Unauthorized data is transmitted

Generic anomaly detection framework

Challenges Lack of universally applicable technique Data contains noise Lack of publicly available labeled dataset Privacy concerns Normal behaviors continually evolving Techniques may not be useful forever Intruders are already aware

Taxonomy of Techniques

Taxonomy of Techniques

Types of Anomalies Point anomaly Contextual anomaly Collective anomaly Single entry Universally anomalous Contextual anomaly Anomalous just in context Conditional Collective anomaly Multiple entries May be correlated

Techinique Output Scores Binary Label Ranked Thresholds Either anomalous or normal Label Multiple well-defined categories

Types of Network Attacks Denial of Service Probes User to Root (U2R) Remote to Local (R2L)

Attack to Anomaly Mapping

Techniques: Classification-based Rely on expert knowledge Signatures Behavioral knowledge Training Normal profile Attacks deviate from norm False positives Datasets Expensive Time intensive

Techniques: Classification-based Support vector machines (SVM) Bayesian Networks Neural Network Rule Based

Techniques: Statistical-based Creation of normal profile False positive False negative Creation of statistical model Distance metric Anomaly threshold Techniques Mixture Model Signal processing techniques Principal component analysis

Techniques: Information theory Translate distributions in single metrics Computationally efficient Metrics Entropy Relative entropy Conditional entropy Relative conditional entropy Information gain

Techniques: Information theory Correlation analysis Multivariate Dissimilarity distance metric

Techniques: Clustering-based Unsupervised Not dependent on expert knowledge Three key assumptions Main clusters are for normal data Small and sparse clusters are anomalous Detection based on distance score K-Means, K-Medoids, EM-Clusters, others

Techniques: Clustering-based Regular clustering Grouping of data rows Co-clustering Grouping of data rows and columns Dimensionality reduction Greater computational efficiency

Techniques Evaluation

Conclusion Existing anomaly detection techniques Single system Single network Local analysis No communication and interaction exists Challenges Comprehensive systems Large networks Dataset availability