DocumentCode
686403
Title
FL-LPVG: An approach for anomaly detection based on flow-level limited penetrable visibility graph
Author
Luo, Y.B. ; Wang, B.S. ; Sun, Y.P. ; Zhang, B.F. ; Chen, X.M.
Author_Institution
Coll. of Comput., Nat. Univ. of Defense Technol., Changsha, China
fYear
2013
fDate
22-24 Nov. 2013
Firstpage
1
Lastpage
7
Abstract
Network-based anomaly detection methods monitor network traffic to discover its potential anomaly behaviors. Due to the hysteresis and incompleteness of the signature establishment as well as the inaccuracy of statistics probability model, the effectiveness of traditional signature-based and statistics-based anomaly detection methods are directly restricted. Besides, the species and complexity of anomaly behaviors are varying so fast along with the outbreak of network traffic and the influence of high-speed access. It is difficult to detect and identify anomaly behaviors accurately based on several features of actual network traffic. Anomaly detection is facing the challenge of big data processing and dimensionality reduction of high-dimensional data. In this paper, we propose an anomaly detection approach based on flow-level limited penetrable visibility graph (FL-LPVG), which constructs complex networks based on the network flow series. This method mines structural behavior patterns of the associated graph and detects anomaly traffic through data mining and entropy-based information theoretic techniques. Experiments on KDD Cup 99 dataset demonstrate that this method greatly simplify the process of anomaly detection, and effectively reduce dimensionality of high-dimensional data, and at the same time this method gets a good detection effect.
Keywords
computer network security; data mining; entropy; statistical analysis; telecommunication traffic; FL-LPVG; anomaly behaviors; anomaly traffic detection; associated graph; big data processing; complex networks; data mining; entropy-based information theoretic techniques; flow-level limited penetrable visibility graph; high-dimensional data dimensionality reduction; network flow series; network traffic; network-based anomaly detection methods; signature establishment hysteresis; signature establishment incompleteness; signature-based anomaly detection methods; statistics probability model; statistics-based anomaly detection methods; structural behavior pattern mining; Anomaly Classification; Anomaly Detection; Limited Penetrable Visibility Graph; Machine Learning;
fLanguage
English
Publisher
iet
Conference_Titel
Information and Network Security (ICINS 2013), 2013 International Conference on
Conference_Location
Beijing
Electronic_ISBN
978-1-84919-729-8
Type
conf
DOI
10.1049/cp.2013.2470
Filename
6826019
Link To Document