Skip to main content

Learning the Daily Model of Network Traffic

  • Conference paper

Part of the book series: Lecture Notes in Computer Science ((LNAI,volume 3488))

Abstract

Anomaly detection is based on profiles that represent normal behaviour of users, hosts or networks and detects attacks as significant deviations from these profiles. In the paper we propose a methodology based on the application of several data mining methods for the construction of the “normal” model of the ingoing traffic of a department-level network. The methodology returns a daily model of the network traffic as a result of four main steps: first, daily network connections are reconstructed from TCP/IP packet headers passing through the firewall and represented by means of feature vectors; second, network connections are grouped by applying a clustering method; third, clusters are described as sets of rules generated by a supervised inductive learning algorithm; fourth, rules are transformed into symbolic objects and similarities between symbolic objects are computed for each couple of days. The result is a longitudinal model of the similarity of network connections that can be used by a network administrator to identify deviations in network traffic patterns that may demand for his/her attention. The proposed methodology has been tested on log files of the firewall of our University Department.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Lazarević, A., Srivastava, J., Kumar, V.: Tutorial on the Pacific-Asia Conference on Knowledge Discovery in Databases (2003)

    Google Scholar 

  2. Axelsson, S.: IDS: A Survey and a Taxonomy (2000)

    Google Scholar 

  3. Bridges, S., Vaughn, R.: Intrusion Detection via Fuzzy Data Mining (2000)

    Google Scholar 

  4. Barbara, D., et al.: ADAM: A Testbed for Exploring the Use of Data Mining in Intrusion Detection. In: SIGMOD 2001 (2001)

    Google Scholar 

  5. Hofmeyr, S.A., Forrest, S., Somayaji, A.: Intrusion Detection Using Sequences of System Calls. Journal of Computer Security 6, 151–180 (1998)

    Google Scholar 

  6. Lee, W., Stolfo, S.J.: Data Mining approach for Intrusion Detection. In: Proceedings of the 1998 USENIX Security Symposium (1998)

    Google Scholar 

  7. Ghosh, A., Schwartzbard, A.: A Study in Using Neural Networks for Anomaly and Misuse Detection. In: Proceedings of the 8th USENIX Security Symposium (1999)

    Google Scholar 

  8. Lane, T., Brodley, C.E.: Sequence Matching and Learning in Anomaly Detection for Computer Security. In: AAAI Workshop: AI Approaches to Fraud Detection and Risk Management, pp. 43–49. AAAI Press, Menlo Park (1997)

    Google Scholar 

  9. Warrender, C., Forrest, S., Pearlmutter, B.: Detecting Intrusions Using Systems Calls: Alternative Data Models. In: IEEE Symposium on Security and Privacy, pp. 133–145. IEEE Computer Society Press, Los Alamitos (1999)

    Google Scholar 

  10. Milligan, G.W.: Clustering Validation: Results and Implications for Applied Analyses. World Scientific Publications, River Edge (1996)

    Google Scholar 

  11. Fayyad, U., Piatetsky-Shapiro, G., Smyth, P., Uthurusamy, R.: Advances in knowledge discovery and data mining. AAAI Press/ The MIT Press (1996)

    Google Scholar 

  12. http://www.cs.waikato.ac.nz/ml/weka

  13. Michalski, R.S., Stepp, R.E.: Learning from Observation: Conceptual Clustering. In: Michalski, R.S., Carbonell, J.G., Michell, T.M. (eds.) Machine Learning: An Artificial Intelligence Approach, pp. 331–363. Morgan Kauffmann, San Mateo (1983)

    Google Scholar 

  14. Fisher, D.H.: Knowledge Acquisition via Incremental Conceptual Clustering. Machine Learning 2, 139–172 (1987)

    Google Scholar 

  15. Witten, I., Frank, E.: Generate Accurate Rule Sets Without Global Optimisation. In: Machine Learning: Proceedings of the 15th International Conference. Morgan Kaufmann Publishers, San Francisco (1998)

    Google Scholar 

  16. Bock, H.H., Diday, E.: Symbolic Objects. In: Bock, H.H., Diday, E. (eds.) Analysis of Symbolic Data. Exploratory Methods for extracting Statistical Information from Complex Data, Series: Studies in Classification, Data Analysis, and Knowledge Organisation, vol. 15, pp. 54–77. Springer, Berlin (2000)

    Google Scholar 

  17. Esposito, F., Malerba, D., Tamma, V.: Dissimilarity Measures for Symbolic Objects. In: Bock, H.-H., Diday, E. (eds.) Analysis of Symbolic Data. Exploratory methods for extracting statistical information from complex data, Series: Studies in Classification, Data Analysis, and Knowledge Organization, ch. 8.3, vol. 15, pp. 165–185. Springer, Berlin (2000)

    Google Scholar 

  18. Gowda, K.C., Diday, E.: Symbolic Clustering Using a New Dissimilarity Measure. Pattern Recognition 24(6), 567–578 (1991)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2005 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Caruso, C., Malerba, D., Papagni, D. (2005). Learning the Daily Model of Network Traffic. In: Hacid, MS., Murray, N.V., Raś, Z.W., Tsumoto, S. (eds) Foundations of Intelligent Systems. ISMIS 2005. Lecture Notes in Computer Science(), vol 3488. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11425274_14

Download citation

  • DOI: https://doi.org/10.1007/11425274_14

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-25878-0

  • Online ISBN: 978-3-540-31949-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics