Title :
Lame´ curve-based signature discovery learning technique for network traffic classification
Author :
Suthaharan, Shan ; Sunkara, Laxmi ; Keshapagu, Sweta
Author_Institution :
Dept. of Comput. Sci., Univ. of North Carolina at Greensboro, Greensboro, NC, USA
Abstract :
Most recent research shows that network intrusion traffic types can be represented by concentric unit circles while network protocols such as http and https can be represented by rectangles. These geometric properties can be used to develop signatures which can be applied to classify different types of network traffic. Discovering these signatures can be done using representation learning techniques. This paper proposes an approach which constructs signatures using a Lame´ curve and its parameters. A Lame´ curve is useful for defining hypo- and hyper- ellipses, and therefore helps approximate intrusion patterns and http/https traffic patterns to circular and rectangular models respectively. Using a supervised learning approach, a p-fold cross-validation technique, and labeled network traffic datasets, suitable values for the Lame´ curve parameters are learned that can robustly create signatures for both intrusion traffic and network protocol (http and https) types. Unlike the concentric unit-circle algorithm that defines perfect circular patterns, and a rectangular representation algorithm that defines fine rectangular patterns, the proposed Lame´ curve technique helps represent the traffic data by approximated geometric (circles and rectangles) shapes. This signature property leads to a robust representation learning technique that is suitable for discrete-value traffic data and helps achieve robust classification of different types of network traffic.
Keywords :
computer network security; learning (artificial intelligence); pattern classification; telecommunication traffic; transport protocols; Lame´ curve-based signature discovery learning technique; circular model; circular pattern; concentric unit-circle algorithm; discrete-value traffic data; geometric property; https; hyperellipse; hypoellipse; intrusion pattern; labeled network traffic dataset; network intrusion traffic type; network protocol; network traffic classification; p-fold cross-validation technique; rectangular model; rectangular pattern; rectangular representation algorithm; representation learning technique; signature development; supervised learning approach; traffic pattern; Approximation algorithms; Classification algorithms; Protocols; Shape; Telecommunication traffic; Testing; Training; Lame´ curve; network intrusion; network protocols; signature discovery; supervised learning; training dataset;
Conference_Titel :
Intelligence and Security Informatics (ISI), 2013 IEEE International Conference on
Conference_Location :
Seattle, WA
Print_ISBN :
978-1-4673-6214-6
DOI :
10.1109/ISI.2013.6578851