Skip to main content
Erschienen in: Automatic Control and Computer Sciences 3/2020

01.05.2020

Influence of Fractal Dimension on Network Anomalies Binary Classification Quality Using Machine Learning Methods

verfasst von: O. I. Sheluhin, M. A. Kazhemskiy

Erschienen in: Automatic Control and Computer Sciences | Ausgabe 3/2020

Einloggen, um Zugang zu erhalten

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

In this paper, it is proposed to improve the efficiency of binary classification of network traffic anomalous behavior by introducing an additional informative feature – fractal dimension. The overall effectiveness of the proposed method is estimated by evaluating the quality of binary classification using the algorithms Decision Tree Classifier, Random Forest and Ada Boost on the example of using the NSL-KDD database. It is shown that adding the fractal dimension in the binary classification of attacks, gives improvement of the precision metric in average by 6%, and for AUC-ROC about 10% for all considered classification algorithms. Furthermore, introduction of fractal dimension as an additional feature has allowed to significantly reduce the time of training and testing of binary classification. So, for the Random Forest algorithm, the decrease in processing time was more than 3 times, and for the Decision Tree Classifier more than 2 times.
Literatur
1.
Zurück zum Zitat Ahmed, M., Mahmood, A.N., and Hu, J., A survey of network anomaly detection techniques, J. Network Comput. Appl., 2016, vol. 60, pp. 19–31.CrossRef Ahmed, M., Mahmood, A.N., and Hu, J., A survey of network anomaly detection techniques, J. Network Comput. Appl., 2016, vol. 60, pp. 19–31.CrossRef
2.
Zurück zum Zitat Acemoglu, D., Malekian, A., and Ozdaglar, A., Network security and contagion, J. Econ. Theory, 2016, vol. 166, pp. 536–585.MathSciNetCrossRef Acemoglu, D., Malekian, A., and Ozdaglar, A., Network security and contagion, J. Econ. Theory, 2016, vol. 166, pp. 536–585.MathSciNetCrossRef
3.
Zurück zum Zitat Witten, I.H., Frank, E., Hall, M.A., and Pal, C.J., Data Mining: Practical Machine Learning Tools and Techniques, Morgan Kaufmann, 2016. Witten, I.H., Frank, E., Hall, M.A., and Pal, C.J., Data Mining: Practical Machine Learning Tools and Techniques, Morgan Kaufmann, 2016.
4.
Zurück zum Zitat Luo, X., Chan, E., and Chang, R., Vanguard: A new detection scheme for a class of TCP targeted denial-of-service attacks, EURASIP J. Adv. Signal Process., 2009, vol. 2009. Luo, X., Chan, E., and Chang, R., Vanguard: A new detection scheme for a class of TCP targeted denial-of-service attacks, EURASIP J. Adv. Signal Process., 2009, vol. 2009.
5.
Zurück zum Zitat Chandola, V., Banerjee, A., and Kumar, V., Anomaly detection for discrete sequences: A survey, IEEE Trans. Knowl. Data Eng., 2012, vol. 24, no. 5. Chandola, V., Banerjee, A., and Kumar, V., Anomaly detection for discrete sequences: A survey, IEEE Trans. Knowl. Data Eng., 2012, vol. 24, no. 5.
6.
Zurück zum Zitat Xiaoqing, G., Hebin, G., and Luyi, C., Network intrusion detection method based on Agent and SVM, 2nd IEEE Int. Conf. Inf., 2010, pp. 399–402. Xiaoqing, G., Hebin, G., and Luyi, C., Network intrusion detection method based on Agent and SVM, 2nd IEEE Int. Conf. Inf., 2010, pp. 399–402.
7.
Zurück zum Zitat Lippmann, R. and Cunningham, R., Improving intrusion detection performance using keyword selection and neural networks, Comput. Networks, 2000, vol. 34, pp. 597–603.CrossRef Lippmann, R. and Cunningham, R., Improving intrusion detection performance using keyword selection and neural networks, Comput. Networks, 2000, vol. 34, pp. 597–603.CrossRef
8.
Zurück zum Zitat Bolon, C., Feature selection and classification in multiple class datasets: An application to KDDCup 99 dataset, Expert Syst. Appl., 2011, vol. 38, pp. 5947–5957.CrossRef Bolon, C., Feature selection and classification in multiple class datasets: An application to KDDCup 99 dataset, Expert Syst. Appl., 2011, vol. 38, pp. 5947–5957.CrossRef
9.
Zurück zum Zitat Sheluhin, O., Smolskiy, S., and Osin, A., Self-Similar Processes in Telecommunications, John Wiley & Sons, 2007.CrossRef Sheluhin, O., Smolskiy, S., and Osin, A., Self-Similar Processes in Telecommunications, John Wiley & Sons, 2007.CrossRef
10.
Zurück zum Zitat Abry, P., Taqqu, M.S., Flandrin, P., and Veitch, D., Wavelets for the analysis, estimation, and synthesis of scaling data, in Self-Similar Network Traffic and Performance Evaluation, Park, K. and Willinger, W., Eds., John Wiley & Sons, 2000, pp. 39–88. Abry, P., Taqqu, M.S., Flandrin, P., and Veitch, D., Wavelets for the analysis, estimation, and synthesis of scaling data, in Self-Similar Network Traffic and Performance Evaluation, Park, K. and Willinger, W., Eds., John Wiley & Sons, 2000, pp. 39–88.
11.
Zurück zum Zitat Zhengmin, X., Songnian, L., and Junhua, T., Note on studying change point of LRD traffic based on Li’s detection of DDoS flood attacking, Math. Probl. Eng., 2010, vol. 2010. Zhengmin, X., Songnian, L., and Junhua, T., Note on studying change point of LRD traffic based on Li’s detection of DDoS flood attacking, Math. Probl. Eng., 2010, vol. 2010.
12.
Zurück zum Zitat Gagandeep, K., Vikas, S., and Jay Prakash, G., Study of self-similarity for detection of rate-based network anomalies, Int. J. Secur. Its Appl., 2017, vol. 11, no. 8, pp. 27–44. Gagandeep, K., Vikas, S., and Jay Prakash, G., Study of self-similarity for detection of rate-based network anomalies, Int. J. Secur. Its Appl., 2017, vol. 11, no. 8, pp. 27–44.
13.
Zurück zum Zitat Sheng, Z., Qifei, Z., Xuezeng, P., and Xuhui, Z., Detection of low-rate DDoS attack based on self similarity, 2010 Second International Workshop on Education Technology and Computer Science, 2010, vol. 1, pp. 333–336. Sheng, Z., Qifei, Z., Xuezeng, P., and Xuhui, Z., Detection of low-rate DDoS attack based on self similarity, 2010 Second International Workshop on Education Technology and Computer Science, 2010, vol. 1, pp. 333–336.
15.
Zurück zum Zitat Wang, X. and Fang, B., An exploratory development on the Hurst parameter variety of network traffic abnormity signal, J. Harbin Inst. Technol., 2005, vol. 37, pp. 1046–1049. Wang, X. and Fang, B., An exploratory development on the Hurst parameter variety of network traffic abnormity signal, J. Harbin Inst. Technol., 2005, vol. 37, pp. 1046–1049.
16.
Zurück zum Zitat Sheluhin, O., Multifractals. Information Applications, Moscow: Hotline–Telecom, 2011. Sheluhin, O., Multifractals. Information Applications, Moscow: Hotline–Telecom, 2011.
17.
Zurück zum Zitat Sheluhin, O., Erokhin, S., and Vaniushina, A., IP-Traffic Classification by Machine Learning Methods, Moscow: Hotline-Telekom, 2018. Sheluhin, O., Erokhin, S., and Vaniushina, A., IP-Traffic Classification by Machine Learning Methods, Moscow: Hotline-Telekom, 2018.
18.
Zurück zum Zitat DARPA Dataset. https://www.ll.mit.edu/r-d/datasets. Accessed August 14, 2019. DARPA Dataset. https://​www.​ll.​mit.​edu/​r-d/​datasets.​ Accessed August 14, 2019.
19.
Zurück zum Zitat KDD Cup 1999 Data. https://kdd.ics.uci.edu/databases/kddcup99/kddcup99. Accessed August 12, 2019. KDD Cup 1999 Data. https://​kdd.​ics.​uci.​edu/​databases/​kddcup99/​kddcup99.​ Accessed August 12, 2019.
20.
Zurück zum Zitat NSL-KDD Dataset. https://www.unb.ca/cic/datasets/nsl.html. Accessed August 13, 2019. NSL-KDD Dataset. https://​www.​unb.​ca/​cic/​datasets/​nsl.​html.​ Accessed August 13, 2019.
21.
Zurück zum Zitat Sheluhin, O. and Dolgova, A., Fractal characteristics of network attacks, collection of works, XIII International branch scientific and technical conference “Technologies of Information Society,” Moscow, 2019, vol. 1, pp. 405–409. Sheluhin, O. and Dolgova, A., Fractal characteristics of network attacks, collection of works, XIII International branch scientific and technical conference “Technologies of Information Society,” Moscow, 2019, vol. 1, pp. 405–409.
22.
Zurück zum Zitat The UNSW-NB15 data set description. https://www.unsw.adfa.edu.au/unsw-canberra-cyber/cybersecurity/ ADFA-NB15-Datasets/. Accessed December 1, 2019. The UNSW-NB15 data set description. https://​www.​unsw.​adfa.​edu.​au/​unsw-canberra-cyber/​cybersecurity/​ ADFA-NB15-Datasets/. Accessed December 1, 2019.
Metadaten
Titel
Influence of Fractal Dimension on Network Anomalies Binary Classification Quality Using Machine Learning Methods
verfasst von
O. I. Sheluhin
M. A. Kazhemskiy
Publikationsdatum
01.05.2020
Verlag
Pleiades Publishing
Erschienen in
Automatic Control and Computer Sciences / Ausgabe 3/2020
Print ISSN: 0146-4116
Elektronische ISSN: 1558-108X
DOI
https://doi.org/10.3103/S0146411620030074

Weitere Artikel der Ausgabe 3/2020

Automatic Control and Computer Sciences 3/2020 Zur Ausgabe

Neuer Inhalt