Abstract
In the present network security management, improvements in the performances of Intrusion Detection Systems(IDSs) are strongly desired. In this paper, we propose a network anomaly detection technique which can learn a state of network traffic based on per-flow and per-service statistics. These statistics consist of service request frequency, characteristics of a flow and code histogram of payloads. In this technique, we achieve an effective definition of the network state by observing the network traffic according to service. Moreover, we conduct a set of experiments to evaluate the performance of the proposed scheme and compare with those of other techniques.
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Anderson, D., Lunt, T.F., Javits, H., Tamaru, A., Valdes, A.: Detecting unusual program behavior using the statistical component of the Nextgeneration Intrusion Detection Expert System(NIDES). Computer Science Laboratory SRI-CSL 95-06 ( May 1995)
SPADE, Silicon Defense, http://www.silicondefense.com/software/spice/
DARPA off-line intrusion detection evaluation test set (1999), http://www.ll.mit.edu/IST/ideval/index.html
Mahoney, M.V., Chan, P.K.: Detecting Novel Attacks by Identifying AnomalousNetwork Packet Headers. Florida Institute of Technology Technical Report CS-2001-2 (2001)
Mahoney, M.: Network Traffic Anomaly Detection Based on Packet Bytes. Proc. ACM-SAC, 346–350 (2003)
Mahoney, M.V., Chan, P.K.: Learning Nonstationary Models of Normal Network Traffic for Detarcting Novel Attacks. In: SIGKDD 2002, Edmonton, Alberta, Canada, July 23-26 (2002)
Neumann, P., Porras, P.: Experience with EMERALD to DATE. In: Proceedings 1st USENIX Workshop on Intrusion Detection and Network Monitoring, Santa Clara, California, April 1999, pp. 73–80 (1999), http://www.sdl.sri.com/projects/emerald/inde.html
Vigna, G., Eckmann, S.T., Kemmerer, R.A.: The STAT Tool Suite. In: Proceedings of the 2000 DARPA Information Survivability Conference and Exposition (DISCEX). IEEE Press, Los Alamitos (2000)
Sekar, R., Uppuluri, P.: Synthesizing Fast Intrusion Prevention/Detection Systems from High-Level Specifications. In: Proceedings 8th Usenix Security Symposium, Washington, D.C. (Augest 1999), http://rcs-sgi.cs.iastate.edu/sekar/abs/usenixsec99.htm
Jajodia, S., Barbara, D., Speegle, B., Wu, N.: Audit Data Analysis and Mining (ADAM) (April 2000), Project described in, http://www.isse.gmu.edu/~dbarbara/adam.html
Tyson, M., Berry, P., Williams, N., Moran, D., Blei, D.: DERBI: Diagnosis, Explanation and Recovery from computer Break-Ins (April 2000), project described in, http://www.ai.sri.com/~derbi/
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2005 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Waizumi, Y., Kudo, D., Kato, N., Nemoto, Y. (2005). A New Network Anomaly Detection Technique Based on Per-Flow and Per-Service Statistics. In: Hao, Y., et al. Computational Intelligence and Security. CIS 2005. Lecture Notes in Computer Science(), vol 3802. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11596981_37
Download citation
DOI: https://doi.org/10.1007/11596981_37
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-30819-5
Online ISBN: 978-3-540-31598-8
eBook Packages: Computer ScienceComputer Science (R0)