Network Anomaly Detection Based on Wavelet Analysis

被引:131
作者
Lu, Wei [1 ]
Ghorbani, Ali A. [1 ]
机构
[1] Univ New Brunswick, Informat Secur Ctr Excellence, Fredericton, NB E3B 5A3, Canada
来源
EURASIP JOURNAL ON ADVANCES IN SIGNAL PROCESSING | 2009年
关键词
50;
D O I
10.1155/2009/837601
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Signal processing techniques have been applied recently for analyzing and detecting network anomalies due to their potential to find novel or unknown intrusions. In this paper, we propose a new network signal modelling technique for detecting network anomalies, combining the wavelet approximation and system identification theory. In order to characterize network traffic behaviors, we present fifteen features and use them as the input signals in our system. We then evaluate our approach with the 1999 DARPA intrusion detection dataset and conduct a comprehensive analysis of the intrusions in the dataset. Evaluation results show that the approach achieves high-detection rates in terms of both attack instances and attack types. Furthermore, we conduct a full day's evaluation in a real large-scale WiFi ISP network where five attack types are successfully detected from over 30 millions flows. Copyright (C) 2009 W. Lu and A. A. Ghorbani.
引用
收藏
页数:16
相关论文
共 44 条
[1]  
Anderson J. P., 1999, COMPUTER SECURITY TH
[2]  
[Anonymous], P IEEE C GLOB TEL
[3]  
[Anonymous], 1999, A Wavelet Tour of Signal Processing
[4]  
Axelsson S., 2000, ACM Transactions on Information and Systems Security, V3, P186, DOI 10.1145/357830.357849
[5]  
Barford P, 2002, IMW 2002: PROCEEDINGS OF THE SECOND INTERNET MEASUREMENT WORKSHOP, P71, DOI 10.1145/637201.637210
[6]  
Barreno Marco, 2006, P 2006 ACM S INF COM, P16
[7]  
CERT Coordination Center, 2000, DOS DEV ADV CA 2000
[8]  
CERT Coordination Center, 1999, DEN OF SERV TOOLS AD
[9]   MAXIMUM LIKELIHOOD FROM INCOMPLETE DATA VIA EM ALGORITHM [J].
DEMPSTER, AP ;
LAIRD, NM ;
RUBIN, DB .
JOURNAL OF THE ROYAL STATISTICAL SOCIETY SERIES B-METHODOLOGICAL, 1977, 39 (01) :1-38
[10]   AN INTRUSION-DETECTION MODEL [J].
DENNING, DE .
IEEE TRANSACTIONS ON SOFTWARE ENGINEERING, 1987, 13 (02) :222-232