Presentation is loading. Please wait.

Presentation is loading. Please wait.

A survey of network anomaly detection techniques

Similar presentations


Presentation on theme: "A survey of network anomaly detection techniques"— Presentation transcript:

1 A survey of network anomaly detection techniques
Journal of Network and Computer Applications 60 (2016) 19–31 A survey of network anomaly detection techniques Mohiuddin Ahmed Abdun Naser Mahmood Jiankun Hu School of Engineering and Information Technology, UNSW Canberra, ACT 2600, Australia Otto

2 Motivation Information and Communication Technology (ICT) ICT includes
Social wellbeing Economic growth National security ICT includes Computers Mobile communication devices Networks Legitimate users People with malicious intent

3 Motivation

4 We must have tools to detect malicious intent
Motivation We must have tools to detect malicious intent

5 The Survey Anomaly discussion Anomaly detection technique groups
Types and detection Network attacks Mapping network attacks to anomalies Anomaly detection technique groups Classification based Statistical based Information theory based Clustering Based Datasets, evaluation and issues

6 Anomalies “An anomaly is an observation which deviates so much from other observations as to arouse suspicions that it was generated by a different mechanism”

7 Anomalies In a given dataset, anomalies may be
Abnormal data Anomalous data Indicate significant but rare events Prompt critical actions to be taken Unusual network traffic patterns A change in service usage patterns A computer has been hacked Unauthorized data is transmitted

8 Generic anomaly detection framework

9 Challenges Lack of universally applicable technique
Data contains noise Lack of publicly available labeled dataset Privacy concerns Normal behaviors continually evolving Techniques may not be useful forever Intruders are already aware

10 Taxonomy of Techniques

11 Taxonomy of Techniques

12 Types of Anomalies Point anomaly Contextual anomaly Collective anomaly
Single entry Universally anomalous Contextual anomaly Anomalous just in context Conditional Collective anomaly Multiple entries May be correlated

13 Techinique Output Scores Binary Label Ranked Thresholds
Either anomalous or normal Label Multiple well-defined categories

14 Types of Network Attacks
Denial of Service Probes User to Root (U2R) Remote to Local (R2L)

15 Attack to Anomaly Mapping

16 Techniques: Classification-based
Rely on expert knowledge Signatures Behavioral knowledge Training Normal profile Attacks deviate from norm False positives Datasets Expensive Time intensive

17 Techniques: Classification-based
Support vector machines (SVM) Bayesian Networks Neural Network Rule Based

18 Techniques: Statistical-based
Creation of normal profile False positive False negative Creation of statistical model Distance metric Anomaly threshold Techniques Mixture Model Signal processing techniques Principal component analysis

19 Techniques: Information theory
Translate distributions in single metrics Computationally efficient Metrics Entropy Relative entropy Conditional entropy Relative conditional entropy Information gain

20 Techniques: Information theory
Correlation analysis Multivariate Dissimilarity distance metric

21 Techniques: Clustering-based
Unsupervised Not dependent on expert knowledge Three key assumptions Main clusters are for normal data Small and sparse clusters are anomalous Detection based on distance score K-Means, K-Medoids, EM-Clusters, others

22 Techniques: Clustering-based
Regular clustering Grouping of data rows Co-clustering Grouping of data rows and columns Dimensionality reduction Greater computational efficiency

23 Techniques Evaluation

24 Conclusion Existing anomaly detection techniques
Single system Single network Local analysis No communication and interaction exists Challenges Comprehensive systems Large networks Dataset availability


Download ppt "A survey of network anomaly detection techniques"

Similar presentations


Ads by Google