| Literature DB >> 35082307 |
Liangchen Chen1,2,3, Shu Gao4, Baoxu Liu5,6.
Abstract
With the rapid development of network technologies and the increasing amount of network abnormal traffic, network anomaly detection presents challenges. Existing supervised methods cannot detect unknown attack, and unsupervised methods have low anomaly detection accuracy. Here, we propose a clustering-based network anomaly detection model, and then a novel density peaks clustering algorithm DPC-GS-MND based on grid screening and mutual neighborhood degree for network anomaly detection. The DPC-GS-MND algorithm utilizes grid screening to effectively reduce the computational complexity, improves the clustering accuracy through mutual neighborhood degree, and also defines a cluster center decision value for automatically selecting cluster centers. We implement complete experiments on two real-world datasets KDDCup99 and CIC-IDS-2017, and the experimental results demonstrated that the proposed DPC-GS-MND can detect network anomaly traffic with higher accuracy and efficiency. Together, it has a good application prospect in the network anomaly detection system in complex network environments.Entities:
Year: 2022 PMID: 35082307 PMCID: PMC8792034 DOI: 10.1038/s41598-021-02038-z
Source DB: PubMed Journal: Sci Rep ISSN: 2045-2322 Impact factor: 4.379
Figure 1The classification of network anomaly detection techniques.
Figure 2Network traffic anomaly detection design.
Specific of KDD 99 10% percent.
| Traffic category | Specific classes | Training size | Testing size |
|---|---|---|---|
| Normal | normal | 97,278 | 60,593 |
| DoS | mailbomb, smurf, teardrop, apache2, back, processtable, land, pod, neptune, udpstorm | 391,458 | 229,853 |
| Probe | satan, portsweep, mscan, saint, nmap, ipsweep | 4107 | 4166 |
| U2R | sqlattack, rootkit, xterm, perl, ps, httptunnel, buffer_overflow, loadmodule | 52 | 228 |
| R2L | xsnoop, xlock, ftp_write, spy, named, warezmaster, guess_passwd, phf, warezclient, worm, snmpgetattack, imap, snmpguess, multihop, sendmail | 1126 | 16,189 |
| Total | 39 classes attacks | 494,021 | 311,029 |
The features used in experience.
| Feature name | Feature value | Feature description |
|---|---|---|
| logged_in | 0,1 | 1 if successfully logged in, else 0 |
| dst_host_count | [0,255] | Number of connections with same dst host |
| count | [0,511] | Number of connections to same host as current connection |
| dst_host_srv_count | [0,255] | Number of connections with same dst host and service |
| dst_host_serror_rate | [0,1.00] | % of connections to current host with S0 errors |
| same_srv_rate | [0,1.00] | % of connections to the same service |
| dst_bytes | [0,113 billion] | Bytes from dst to src |
| srv_serror_rate | [0,1.00] | % of connections with same srv that have “SYN” errors |
| Dst_host_srv_serror_rate | [0,1.00] | % of connections to current host and specified service |
| serror_rate | [0,1.00] | % of connections with same dst that have “SYN” errors |
Figure 3The algorithm flowchart.
Figure 4Comparison Accuracy and Time of DPC and DPC-GS-MND.
Figure 5Detection accuracies on single attack type data.
Figure 6Anomaly detection accuracy comparing of DPC-GS-MND, DPC-GS, DPC-GS and DPC.
Figure 7Anomaly detection running time comparing of DPC-GS-MND, DPC-GS, DPC-GS and DPC.
Accuracy rate and running time of four algorithms.
| Detection method | Accuracy rate (%) | Running time (ms) |
|---|---|---|
| MDPCA | 90.57 | 378.2 |
| DPCG | 94.25 | 274.8 |
| DPC-DLP | 95.96 | 452.7 |
| DPC-GS-MND | 96.83 | 288.6 |
Figure 8Anomaly detection accuracies on CIC-IDS-2017.