Enhanced network traffic anomaly detector

  • Authors:
  • Suresh Reddy;Sukumar Nandi

  • Affiliations:
  • Department of Computer Science and Engineering, Indian Institute of Technology, Guwahati, India;Department of Computer Science and Engineering, Indian Institute of Technology, Guwahati, India

  • Venue:
  • ICDCIT'05 Proceedings of the Second international conference on Distributed Computing and Internet Technology
  • Year:
  • 2005

Quantified Score

Hi-index 0.00

Visualization

Abstract

Network intrusion detection systems often rely on matching patterns that are learned from known attacks. While this method is reliable and rarely produces false alarms, it has the disadvantage that it cannot detect novel attacks. An alternative approach is to learn a model of normal traffic and report deviations, but these anomaly models are typically restricted to modeling IP addresses and ports. We describe an anomaly detection system which models all the fields of network, transport layer and payload of a packet at the byte level, by giving more weight to the most anomalous attributes. We investigated all the attributes and assigned weights to the attributes based on their anomalous behavior. We detect 144 of 185 attacks in the DARPA off-line intrusion detection evaluation data set [1] at 10 false alarms per day (total 100 false alarms), after training on one week of attack-free traffic. We investigate the performance of the system when attack free training data is not available.