DocumentCode :
2620609
Title :
Steps Towards Autonomous Network Security: Unsupervised Detection of Network Attacks
Author :
Casas, Pedro ; Mazel, Johan ; Owezarski, Philippe
Author_Institution :
LAAS, CNRS, Toulouse, France
fYear :
2011
fDate :
7-10 Feb. 2011
Firstpage :
1
Lastpage :
5
Abstract :
The unsupervised detection of network attacks represents an extremely challenging goal. Current methods rely on either very specialized signatures of previously seen attacks, or on expensive and difficult to produce labeled traffic data-sets for profiling and training. In this paper we present a completely unsupervised approach to detect attacks, without relying on signatures, labeled traffic, or training. The method uses robust clustering techniques to detect anomalous traffic flows, sequentially captured in a temporal sliding-window basis. The structure of the anomaly identified by the clustering algorithms is used to automatically construct specific filtering rules that characterize its nature, providing easy-to-interpret information to the network operator. In addition, these rules are combined to create an anomaly signature, which can be directly exported towards standard security devices like IDSs, IPSs, and/or Firewalls. The clustering algorithms are highly adapted for parallel computation, which permits to perform the unsupervised detection and construction of signatures in an on-line basis. We evaluate the performance of this new approach to discover and to build signatures for different network attacks without any previous knowledge, using real traffic traces. Results show that knowledge-independent detection and characterization of network attacks is possible, opening the door to a whole new generation of autonomous security algorithms.
Keywords :
parallel algorithms; pattern clustering; security of data; unsupervised learning; network attacks; network operator; parallel computation; robust clustering techniques; sliding window basis; steps towards autonomous network security; traffic data sets; unsupervised detection; Clustering algorithms; Computed tomography; Computer crime; Filtering; IP networks; Robustness;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
New Technologies, Mobility and Security (NTMS), 2011 4th IFIP International Conference on
Conference_Location :
Paris
ISSN :
2157-4952
Print_ISBN :
978-1-4244-8705-9
Electronic_ISBN :
2157-4952
Type :
conf
DOI :
10.1109/NTMS.2011.5721067
Filename :
5721067
Link To Document :
بازگشت