Journal of Information Security

Volume 3, Issue 3 (July 2012)

ISSN Print: 2153-1234   ISSN Online: 2153-1242

Google-based Impact Factor: 3.79  Citations  

Data Stream Subspace Clustering for Anomalous Network Packet Detection

HTML  Download Download as PDF (Size: 304KB)  PP. 215-223  
DOI: 10.4236/jis.2012.33027    5,344 Downloads   8,526 Views  Citations
Author(s)

ABSTRACT

As the Internet offers increased connectivity between human beings, it has fallen prey to malicious users who exploit its resources to gain illegal access to critical information. In an effort to protect computer networks from external attacks, two common types of Intrusion Detection Systems (IDSs) are often deployed. The first type is signature-based IDSs which can detect intrusions efficiently by scanning network packets and comparing them with human-generated signatures describing previously-observed attacks. The second type is anomaly-based IDSs able to detect new attacks through modeling normal network traffic without the need for a human expert. Despite this advantage, anomaly-based IDSs are limited by a high false-alarm rate and difficulty detecting network attacks attempting to blend in with normal traffic. In this study, we propose a StreamPreDeCon anomaly-based IDS. StreamPreDeCon is an extension of the preference subspace clustering algorithm PreDeCon designed to resolve some of the challenges associated with anomalous packet detection. Using network packets extracted from the first week of the DARPA '99 intrusion detection evaluation dataset combined with Generic Http, Shellcode and CLET attacks, our IDS achieved 94.4% sensitivity and 0.726% false positives in a best case scenario. To measure the overall effectiveness of the IDS, the average sensitivity and false positive rates were calculated for both the maximum sensitivity and the minimum false positive rate. With the maximum sensitivity, the IDS had 80% sensitivity and 9% false positives on average. The IDS also averaged 63% sensitivity with a 0.4% false positive rate when the minimal number of false positives is needed. These rates are an improvement on results found in a previous study as the sensitivity rate in general increased while the false positive rate decreased.

Share and Cite:

Z. Miller and W. Hu, "Data Stream Subspace Clustering for Anomalous Network Packet Detection," Journal of Information Security, Vol. 3 No. 3, 2012, pp. 215-223. doi: 10.4236/jis.2012.33027.

Cited by

[1] An intrusion detection algorithm based on data streams mining and cognitive computing
2020
[2] Haliteds: Fast and Scalable Subspace Clustering for Multidimensional Data Streams
2016
[3] 'HALITE IND. DS': fast and scalable subspace clustering for multidimensional data streams
2016
[4] Anomalous network packet detection
2015
[5] Early detection of network element outages based on customer trouble calls
Decision Support Systems, 2015
[6] 'HALITE IND. DS': agrupamento de dados em subespaços de séries temporais multidimensionais
2014
[7] Halite-ds: Agrupamento de Dados em Subespaços de Séries Temporais Multidimensionais.
2014
[8] Haliteds: Agrupamento de Dados em Subespa?os de Séries Temporais Multidimensionais
2014
[9] Panda (Processing And Analysis Of Network Data) Para La Deteccion De Ataques Syn-Flood Y Satan Sobre Flujos Continuos De Paquetes De Red Mediante …
2013
[10] Panda (Processing And Analysis Of Network Data) Para La Deteccion De Ataques Syn-Flood Y Satan Sobre Flujos Continuos De Paquetes De Red …
2013

Copyright © 2024 by authors and Scientific Research Publishing Inc.

Creative Commons License

This work and the related PDF file are licensed under a Creative Commons Attribution 4.0 International License.