On Early Detection of Anomalous Network Flows

نویسندگان

چکیده

There are numerous methods of identifying network-based attacks using machine learning, but processing complexity often constrains it to analyses previously captured traffic retroactively identify attacks. This paper investigates learning for early detection in progress with minimal preprocessing. We transform raw network data directly into formats suitable several and deep models including Random Forest two-dimensional Convolutional Neural Networks. Many these demonstrate high accuracy detecting a mixture mostly DoS- botnet-related types five open-source datasets containing packet captures from testbed-generated traffic. compare our results post-mortem trace analysis prior works which also analyze datasets. the features, limitations, complexity, those works. When trained tested on same datasets, most performed very well (>95% accuracy) being best. investigated training time required testing throughput, RF consistently outperformed other models.

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Anomalous Payload-Based Network Intrusion Detection

We present a payload-based anomaly detector, we call PAYL, for intrusion detection. PAYL models the normal application payload of network traffic in a fully automatic, unsupervised and very effecient fashion. We first compute during a training phase a profile byte frequency distribution and their standard deviation of the application payload flowing to a single host and port. We then use Mahala...

متن کامل

Network Anomalous Intrusion Detection using Fuzzy-Bayes

Security of networking systems has been an issue since computer networks became prevalent, most especially now that Internet is changing the facie computing. Intrusions pose significant threats to the integrity, confidentiality and availability of information for the internet users. In this paper, a new approach to real-time network anomaly intrusion detection via Fuzzy-Bayesian is proposed to ...

متن کامل

On continuous network flows

This work addresses two problems concerning continuous dynamic flows. A model is presented for a network that incorporates continuous time-varying flows, link capacities, node storage capacities, as well as time dependent link delays. It is an enhancement of previous results which do not incorporate time varying link delays. We present a generalized min-cut max-flow theorem for that model. A se...

متن کامل

Detection of an Anomalous Cluster in a Network

We consider the model surveillance problem of detecting whether or not in a given sensor network, there is a cluster of sensors which exhibit an “unusual behavior.” Formally, suppose we are given a set of nodes (sensors) and attach a time series to each node (information transmitted by the sensor). We observe a realization of this process over time and want to decide between the null, where all...

متن کامل

Modeling of Partial Digest Problem as a Network flows problem

Restriction Site Mapping is one of the interesting tasks in Computational Biology. A DNA strand can be thought of as a string on the letters A, T, C, and G. When a particular restriction enzyme is added to a DNA solution, the DNA is cut at particular restriction sites. The goal of the restriction site mapping is to determine the location of every site for a given enzyme. In partial digest metho...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: IEEE Access

سال: 2023

ISSN: ['2169-3536']

DOI: https://doi.org/10.1109/access.2023.3291686