Title :
Network Forensic Analysis Using Growing Hierarchical SOM
Author :
Shin-Ying Huang ; Yennun Huang
Author_Institution :
Acad. Sinica, Res. Center for Inf. Technol. Innovation, Taipei, Taiwan
Abstract :
IP flow analysis is an effective way of doing network forensic analysis which aims to detect attack patterns and identify attackers in a given network traffic data. For attacks such as Distributed Denial of Service (DDoS), efficiently identifying the botnet in time can be a challenge. Recently, the unsupervised learning methods such as the K-means, self-organizing map (SOM), and growing hierarchical self-organizing map (GHSOM) have been shown to be able to facilitate network anomaly detection. However, there is no study focusing on mining IP flows with high variability of attacks in an intuitive way. In this study, we leverage the visualization specialty of GHSOM to help analyze the static IP flow data, also called the network traces of victims, to identify any suspicious IP source. The GHSOM can generate a hierarchical architecture based on the input data and help reveal their inherent hierarchical relationships. For example, the geometric distances between each attack pattern and its descriptive information are revealed in the topological space which forms the signature of a botnet. The IP flows clustered by GHSOM are grouped with distinctive connecting features, and the differences between each cluster are visualized with sequential time stamps which can be used to portray various attack patterns, help explore the sources of attacks and understand the behaviors of attacks. The experimental results from real-world traffic data show that forensic analysis using GHSOM can efficiently identify several DDoS attack patterns and generate filtering rules for intrusion detection system (IDS) by further inspecting and book marking the suspicious IP sources.
Keywords :
IP networks; computer network security; data analysis; data visualisation; digital forensics; self-organising feature maps; unsupervised learning; Botnet; GHSOM visualization specialty; IDS; IP sources; K-means; attack pattern detection; book marking; distributed denial of service attack; filtering rule generation; geometric distances; growing hierarchical SOM; growing hierarchical self-organizing map; hierarchical architecture; intrusion detection system; network anomaly detection; network forensic analysis; network traffic data; real-world traffic data; sequential time stamps; several DDoS attack patterns; static IP flow data analysis; topological space; unsupervised learning methods; victim network traces; Data visualization; Filtering; Forensics; IP networks; Internet; Telecommunication traffic; Telescopes; Data clustering; Feature extraction; Network anomaly detection; Network forensics; Neural networks;
Conference_Titel :
Data Mining Workshops (ICDMW), 2013 IEEE 13th International Conference on
Conference_Location :
Dallas, TX
Print_ISBN :
978-1-4799-3143-9
DOI :
10.1109/ICDMW.2013.66