Combining Multiple One-Class Classifiers for Hardening Payload-based Anomaly Detection Systems

نویسندگان

  • Roberto Perdisci
  • Guofei Gu
  • Wenke Lee
چکیده

Intrusion Detection Systems (IDS) are valuable tools for the defense-in-depth of computer networks. Network IDS look for known or potential malicious activities in network traffic and raise an alarm whenever a suspicious activity is detected. Two main approaches to intrusion detection are used, namely misuse and anomaly detection [10]. Misuse detectors are based on a description of known malicious activities. This description is often modeled as a set of rules referred to as attack signatures. Activities that match an attack signature are classified as malicious. Anomaly detectors are based on a description of normal or benign activities. A distance between the description of normal events and new network activities is measured. As malicious activities are expected to be different from normal activities, a suitable distance measure allows anomaly-based IDS to detect attack traffic. Anomaly-based detection systems usually produce a relatively higher number of false positives, compared to the misuse-based or signature-based detection systems. However, anomaly detectors are able to detect zero-day (i.e., never-before-seen) attacks, whereas signature-based systems are not. Unsupervised or unlabeled learning approaches for network anomaly detection have been proposed in [12, 4]. These methods aim to work on datasets of traffic extracted from real networks without the necessity of a labeling process. Unlabeled anomaly detection systems are based on the reasonable assumption that the percentage of attack patterns in the extracted traffic traces is usually much lower than the percentage of normal patterns [12]. Furthermore, it is possible to use signature-based IDS in order to filter the extracted traffic by removing the known attacks, thus further reducing the number of attack patterns possibly present in the dataset. Another assumption is that the attack patterns are supposed to be distinguishable from the normal patterns in a suitable feature space. The term “unlabeled anomaly detection” used in the intrusion detection field actually refears to what in machine learning is more often called “novelty detection”, “outlier detection” or “one-class classification”. Recent work on unlabeled anomaly detection focused on high speed classification based on simple payload statistics [7, 9, 14, 15]. For example, PAYL [14, 15] extracts 256 features from the payload. Each feature represents the occurrence frequency in the payload of one of the 256 possible byte values. A simple model of normal traffic is then constructed by computing the average and standard deviation of each feature. A payload is considered anomalous if a simplified Mahalanobis distance between the payload under test and the model of normal traffic exceeds a predetermined threshold. Wang et al. [14] also proposed a more generic n-gram version of PAYL. In this case the payload is described by a pattern vector in a 256n-dimensional feature space. The n-grams extract byte sequence information from the payload, which helps in constructing a more precise model of the normal traffic compared to the simple byte frequency-based model. The extraction of n-gram statistics from the payload can be performed efficiently and the IDS can be used to monitor high speed links in real time. However, given the exponentially growing number of extracted features, the higher n the more difficult it may be to construct an accurate model because of the curse of dimensionality and possible computational complexity problems. It has been demonstrated that many anomaly detection systems can be “evaded” bymimicry attacks [13, 6, 1, 5]. A mimicry attack is an attack against a network or system vulnerability that is carefully crafted so that the attack

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

McPAD: A multiple classifier system for accurate payload-based anomaly detection

Anomaly-based network Intrusion Detection Systems (IDS) are valuable tools for the defense-in-depth of computer networks. Unsupervised or unlabeled learning approaches for network anomaly detection have been recently proposed. Such anomaly-based network IDS are able to detect (unknown) zero-day attacks, although much care has to be dedicated to controlling the amount of false positives generate...

متن کامل

ADAPTIVE ORDERED WEIGHTED AVERAGING FOR ANOMALY DETECTION IN CLUSTER-BASED MOBILE AD HOC NETWORKS

In this paper, an anomaly detection method in cluster-based mobile ad hoc networks with ad hoc on demand distance vector (AODV) routing protocol is proposed. In the method, the required features for describing the normal behavior of AODV are defined via step by step analysis of AODV and independent of any attack. In order to learn the normal behavior of AODV, a fuzzy averaging method is used fo...

متن کامل

Automated Detection of Multiple Sclerosis Lesions Using Texture-based Features and a Hybrid Classifier

Background: Multiple Sclerosis (MS) is the most frequent non-traumatic neurological disease capable of causing disability in young adults. Detection of MS lesions with magnetic resonance imaging (MRI) is the most common technique. However, manual interpretation of vast amounts of data is often tedious and error-prone. Furthermore, changes in lesions are often subtle and extremely unrepresentati...

متن کامل

A Novel Ensemble Approach for Anomaly Detection in Wireless Sensor Networks Using Time-overlapped Sliding Windows

One of the most important issues concerning the sensor data in the Wireless Sensor Networks (WSNs) is the unexpected data which are acquired from the sensors. Today, there are numerous approaches for detecting anomalies in the WSNs, most of which are based on machine learning methods. In this research, we present a heuristic method based on the concept of “ensemble of classifiers” of data minin...

متن کامل

Cooperative Control of Multiple Quadrotors for Transporting a Common Payload

This paper investigates the problem of controlling a team of Quadrotors that cooperatively transport a common payload. The main contribution of this study is to propose a cooperative control algorithm based on a decentralized algorithm. This strategy is comprised of two main steps: the first one is calculating the basic control vectors for each Quadrotor using Moore–Penrose theory aiming at coo...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2007