DocumentCode :
3305880
Title :
Adaptive framework for network traffic classification using dimensionality reduction and clustering
Author :
Juvonen, Antti ; Sipola, Tuomo
Author_Institution :
Dept. of Math. Inf. Technol., Univ. of Jyvaskyla, Jyväskylä, Finland
fYear :
2012
fDate :
3-5 Oct. 2012
Firstpage :
274
Lastpage :
279
Abstract :
Information security has become a very important topic especially during the last years. Web services are becoming more complex and dynamic. This offers new possibilities for attackers to exploit vulnerabilities by inputting malicious queries or code. However, these attack attempts are often recorded in server logs. Analyzing these logs could be a way to detect intrusions either periodically or in real time. We propose a framework that preprocesses and analyzes these log files. HTTP queries are transformed to numerical matrices using n-gram analysis. The dimensionality of these matrices is reduced using principal component analysis and diffusion map methodology. Abnormal log lines can then be analyzed in more detail. We expand our previous work by elaborating the cluster analysis after obtaining the low-dimensional representation. The framework was tested with actual server log data collected from a large web service. Several previously unknown intrusions were found. Proposed methods could be customized to analyze any kind of log data. The system could be used as a real-time anomaly detection system in any network where sufficient data is available.
Keywords :
Web services; codes; computer network security; file servers; hypermedia; matrix algebra; pattern clustering; principal component analysis; statistical analysis; telecommunication traffic; transport protocols; HTTP query; Web service; abnormal log line analysis; adaptive framework; cluster analysis; diffusion map methodology; dimensionality reduction; information security; intrusion detection; malicious code; malicious query; n-gram analysis; network traffic classification; numerical matrix; principal component analysis; real-time anomaly detection system; server log recording; Algorithm design and analysis; Clustering algorithms; Data mining; Data visualization; Feature extraction; Principal component analysis; Web services; anomaly detection; data mining; diffusion map; intrusion detection; k-means; machine learning; n-grams;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Ultra Modern Telecommunications and Control Systems and Workshops (ICUMT), 2012 4th International Congress on
Conference_Location :
St. Petersburg
ISSN :
2157-0221
Print_ISBN :
978-1-4673-2016-0
Type :
conf
DOI :
10.1109/ICUMT.2012.6459678
Filename :
6459678
Link To Document :
بازگشت