DocumentCode :
686403
Title :
FL-LPVG: An approach for anomaly detection based on flow-level limited penetrable visibility graph
Author :
Luo, Y.B. ; Wang, B.S. ; Sun, Y.P. ; Zhang, B.F. ; Chen, X.M.
Author_Institution :
Coll. of Comput., Nat. Univ. of Defense Technol., Changsha, China
fYear :
2013
fDate :
22-24 Nov. 2013
Firstpage :
1
Lastpage :
7
Abstract :
Network-based anomaly detection methods monitor network traffic to discover its potential anomaly behaviors. Due to the hysteresis and incompleteness of the signature establishment as well as the inaccuracy of statistics probability model, the effectiveness of traditional signature-based and statistics-based anomaly detection methods are directly restricted. Besides, the species and complexity of anomaly behaviors are varying so fast along with the outbreak of network traffic and the influence of high-speed access. It is difficult to detect and identify anomaly behaviors accurately based on several features of actual network traffic. Anomaly detection is facing the challenge of big data processing and dimensionality reduction of high-dimensional data. In this paper, we propose an anomaly detection approach based on flow-level limited penetrable visibility graph (FL-LPVG), which constructs complex networks based on the network flow series. This method mines structural behavior patterns of the associated graph and detects anomaly traffic through data mining and entropy-based information theoretic techniques. Experiments on KDD Cup 99 dataset demonstrate that this method greatly simplify the process of anomaly detection, and effectively reduce dimensionality of high-dimensional data, and at the same time this method gets a good detection effect.
Keywords :
computer network security; data mining; entropy; statistical analysis; telecommunication traffic; FL-LPVG; anomaly behaviors; anomaly traffic detection; associated graph; big data processing; complex networks; data mining; entropy-based information theoretic techniques; flow-level limited penetrable visibility graph; high-dimensional data dimensionality reduction; network flow series; network traffic; network-based anomaly detection methods; signature establishment hysteresis; signature establishment incompleteness; signature-based anomaly detection methods; statistics probability model; statistics-based anomaly detection methods; structural behavior pattern mining; Anomaly Classification; Anomaly Detection; Limited Penetrable Visibility Graph; Machine Learning;
fLanguage :
English
Publisher :
iet
Conference_Titel :
Information and Network Security (ICINS 2013), 2013 International Conference on
Conference_Location :
Beijing
Electronic_ISBN :
978-1-84919-729-8
Type :
conf
DOI :
10.1049/cp.2013.2470
Filename :
6826019
Link To Document :
بازگشت