Anomaly Detection
#1

Network intrusion detection systems often rely on matching patterns that are gleaned from known attacks. While this method is reliable and rarely produces false alarms, it has the obvious disadvantage that it cannot detect novel attacks. An alternative approach is to learn a model of normal traffic and report deviations, but these anomaly models are typically restricted to modeling IP addresses and ports, and do not include the application payload where many attacks occur. We describe a novel approach to anomaly detection.

We extract a set of attributes from each event (IP packet or TCP connection),including strings in the payload, and induce a set of conditional rules which have a very low probability of being violated in a nonstationary model of the normal network traffic in the training data. In the 1999 DARPA intrusion detection evaluation data set, we detect about 60% of 190 attacks at a false alarm rate of 10 per day (100 total). We believe that anomaly detection can work because most attacks exploit software or configuration errors that escaped field testing, so are only exposed under unusual consitions.


Though our rule learning techniques are applied to network intrusion detection, they are general enough for detecting anomalies in other applications.
Reply
#2

Anomaly Detection


.ppt   Anomaly Detection.ppt (Size: 341 KB / Downloads: 1)

What is Anomaly Detection

Detection of deviation from what is consider ( or from its normal behavior)
Capable of detecting Novel attacks or new attacks
Identify a activity that are different from users or a system normal behavior
To detect unauthorized attempts to access the system

Sources of Network Data

Network probes
Packet filtering
Gathering information from router
Monitoring activity of specific user
monitoring memory and N/W usage
etc….

Packet Header Anomaly Detection

Trained on attack free traffic
Checking anomaly field of packet header.
Link Layer
Network Layer
Transport Layer
The model detect novel attacks.
Split large field
Merge small field
During training record each value of fields

ADWICE

This technique deal with massive data
Efficient data structure.
New search Index.
Dynamic nature of normal request and services.
Use clustering for training data.
Where similar data point group together into cluster. Cluster using a distance function for identify closest cluster.
ADWICE store cluster feature in main memory instead of all training data points.



Reply

Important Note..!

If you are not satisfied with above reply ,..Please

ASK HERE

So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page
Popular Searches: anomaly detection ids, anomaly detection at m**artshader, program in matlab on anomaly detection, anomaly detection in matlab, anomaly detection for discrete sequences ppt, anomaly detection matlab coded, spatio temporal network anomaly detection,

[-]
Quick Reply
Message
Type your reply to this message here.

Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)

Possibly Related Threads...
Thread Author Replies Views Last Post
  OBJECT TRACKING AND DETECTION full report project topics 9 30,967 06-10-2018, 12:20 PM
Last Post: jntuworldforum
  Host-Based Intrusion Detection Using user signatures nit_cal 2 2,387 06-10-2016, 10:27 AM
Last Post: ijasti
  DETECTION OF THE MALARIAL PARASITE INFECTED BLOOD IMAGES BY 3D-ANALYSIS project report tiger 2 2,387 26-09-2016, 10:55 AM
Last Post: ijasti
  ULTRA SONIC TECHNIQUES FOR THE DETECTION OF HIDDEN CORROSION IN AIR CRAFT WING SKIN seminar projects crazy 5 6,099 15-04-2016, 08:04 PM
Last Post: knagpur
  ARTIFICIAL INTELLIGENCE IN VIRUS DETECTION AND RECOGNITION seminar project explorer 2 3,351 22-07-2013, 11:44 AM
Last Post: computer topic
  Layered Approach Using Conditional Random Fields for Intrusion Detection project report helper 11 7,751 01-03-2013, 11:58 AM
Last Post: [email protected]
  A Seminar Report On INTRUSION DETECTION SYSTEM Computer Science Clay 1 5,755 23-11-2012, 01:13 PM
Last Post: seminar details
  Image Edge Detection based on FPGA seminar class 1 3,968 18-10-2012, 11:43 AM
Last Post: seminar details
  A NOVEL REPLICA DETECTION SYSTEM USING BINARY CLASSIFIERS, R-TREES, AND PCA computer girl 0 1,047 07-06-2012, 05:16 PM
Last Post: computer girl
  Intrusion Detection in Mobile Ad-Hoc Networks nit_cal 1 1,531 14-03-2012, 01:06 PM
Last Post: seminar paper

Forum Jump: