| Literature DB >> 29329294 |
Muhammad Fahad Umer1, Muhammad Sher1, Yaxin Bi2.
Abstract
The next-generation network provides state-of-the-art access-independent services over converged mobile and fixed networks. Security in the converged network environment is a major challenge. Traditional packet and protocol-based intrusion detection techniques cannot be used in next-generation networks due to slow throughput, low accuracy and their inability to inspect encrypted payload. An alternative solution for protection of next-generation networks is to use network flow records for detection of malicious activity in the network traffic. The network flow records are independent of access networks and user applications. In this paper, we propose a two-stage flow-based intrusion detection system for next-generation networks. The first stage uses an enhanced unsupervised one-class support vector machine which separates malicious flows from normal network traffic. The second stage uses a self-organizing map which automatically groups malicious flows into different alert clusters. We validated the proposed approach on two flow-based datasets and obtained promising results.Entities:
Mesh:
Year: 2018 PMID: 29329294 PMCID: PMC5766127 DOI: 10.1371/journal.pone.0180945
Source DB: PubMed Journal: PLoS One ISSN: 1932-6203 Impact factor: 3.240
Fig 1Next-generation network architecture.
Fig 2Flow monitoring in next-generation network architecture.
Fig 3Architecture of two-stage flow-based intrusion detection system.
Fig 4Malicious flow collection process.
Fig 5Training of one-class SVM using malicious flow.
Detailed attributes for Netflow v5 flow records.
| Attribute | Description |
|---|---|
| Source IP | The source IP address |
| Destination IP | The destination IP address |
| Packets | Number of packets in flow |
| Octets | Number of bytes in flow |
| Duration | The duration of flow in milliseconds |
| Source Port | Source port number |
| Destination Port | Destination port number |
| TCP Flags | Cumulative OR of TCP flags |
| Protocol | The transport layer protocol such 6 = TCP, 17 = UDP |
Detailed flows in Sperotto’s dataset.
| Alert Type | No. of flows | Category |
|---|---|---|
| SSH | 13942629 | Malicious |
| FTP | 13 | Malicious |
| HTTP | 9798 | Malicious |
| AUTH-IDENT | 191339 | Side effect |
| IRC | 7383 | Side effect |
| OTHERS | 18970 | Side effect |
Test and training dataset—Sperotto dataset.
| Training dataset | Testing dataset | ||
|---|---|---|---|
| Malicious | Normal | Malicious | Normal |
| 10000 | 500 | 11740 | 124240 |
Test and training dataset—Malware and APT dataset.
| Training dataset | Testing dataset | ||
|---|---|---|---|
| Malicious | Normal | Malicious | Normal |
| 3524 | 350 | 5286 | 24367 |
Detail of flow records—SIP dataset.
| Traffic Type | No. of flows | Category |
|---|---|---|
| InviteFlood SIP traffic | 6496 | Malicious |
| Splitter SIP traffic | 3927 | Malicious |
| Normal SIP traffic | 7901 | Normal |
Test and training dataset—SIP dataset.
| Training dataset | Testing dataset | ||
|---|---|---|---|
| Malicious | Normal | Malicious | Normal |
| 2083 | 300 | 10423 | 7901 |
Confusion matrix for outlier detection during one-class SVM training—Sperotto’s dataset.
| Classified as | Malicious | Normal (Outliers) |
|---|---|---|
| Malicious | 9161 | 839 |
| Normal (Outliers) | 8 | 492 |
Clustering malicious flows in second stage process—Sperotto’s dataset.
| Alert Cluster | Actual No of Flows | Flows in attack cluster |
|---|---|---|
| HTTP IN | 2127 | 2154 |
| HTTP OUT | 2113 | 2085 |
| SSH IN | 4140 | 3992 |
| SSH OUT | 3360 | 4006 |
| Other-I | 0 | 770 |
| Other-II | 0 | 24 |
| Total | 11740 | 13031 |
Fig 6SOM clustering results comparison—Sperotto’s dataset.
Confusion matrix for outlier detection during one-class SVM training—Malware and APT dataset.
| Classified as | Malicious | Normal (Outliers) |
|---|---|---|
| Malicious | 2857 | 330 |
| Normal (Outliers) | 20 | 667 |
SOM clustering results—Malware and APT dataset.
| Alert Cluster | Actual Flows | Flows in attack cluster |
|---|---|---|
| Sality outgoing | 1669 | 1312 |
| Asprox outgoing | 3336 | 3649 |
| TBot outgoing | 133 | 200 |
| Nuclear outgoing | 88 | 64 |
| Other-I | 0 | 2 |
| Other-II | 0 | 59 |
| Total | 5286 | 5226 |
Fig 7Malware and APT clustering results comparison.
Confusion matrix for outlier detection during one-class SVM training—SIP dataset.
| Classified as | Malicious | Normal (Outliers) |
|---|---|---|
| Malicious | 1701 | 91 |
| Normal (Outliers) | 30 | 170 |
SOM clustering results—SIP dataset.
| Alert Cluster | Actual Flows | Clustering results |
|---|---|---|
| SIP Flood | 6224 | 4848 |
| SIP Spitter | 4815 | 4834 |
| Other-I | 0 | 162 |
| Other-II | 0 | 495 |
| Total | 10339 | 10339 |
Fig 8SOM clustering results comparison—SIP dataset.