165 0

Full metadata record

DC FieldValueLanguage
dc.contributor.author조성현-
dc.date.accessioned2023-04-25T01:38:16Z-
dc.date.available2023-04-25T01:38:16Z-
dc.date.issued2020-08-
dc.identifier.citationProceedings - International Conference on Computer Communications and Networks, ICCCN, article no. 9209657, Page. 1-9-
dc.identifier.issn1095-2055-
dc.identifier.urihttps://ieeexplore.ieee.org/document/9209657en_US
dc.identifier.urihttps://repository.hanyang.ac.kr/handle/20.500.11754/179239-
dc.description.abstractNetwork anomalies are correlated to activities that deviate from regular behavior patterns in a network, and they are undetectable until their actions are defined as malicious. Current work in network anomaly detection includes network-based and host-based intrusion detection systems. However, most of them suffer from high false detection rates due to the base rate fallacy. To overcome such a drawback, this paper proposes a superior behavior-based anomaly detection system (SuperB) that defines legitimate network behaviors of authorized users in order to identify unauthorized accesses. We define the network behaviors of the authorized users by training the proposed deep learning model with time-series data extracted from network packets of each of the users. Then, the trained model is used to classify all other behaviors (we define these as anomalies) from the defined legitimate behaviors. As a result, SuperB effectively detects all anomalies of network behaviors. Our simulation results show that the proposed algorithm needs at least five end-to-end conversations to achieve over 95% accuracy and over 93% recall rate. Some simulations show 100% accuracy and recall rate. Our simulations use live network data combined with the CICIDS2017 data set. The performance has an average of less than 1.1% false-positive rate with some simulations showing 0%. The execution time to process each conversation is 85.20±0.60 milliseconds (ms), and thus it takes about only 426 ms to process five conversations to identify anomaly. © 2020 IEEE.-
dc.languageen-
dc.publisherInstitute of Electrical and Electronics Engineers Inc.-
dc.subjectAnomaly Detection-
dc.subjectBehavior identification-
dc.subjectClassification-
dc.subjectDeep Learning-
dc.subjectNetwork Anomaly-
dc.titleSuperB: Superior Behavior-based Anomaly Detection Defining Authorized Users' Traffic Patterns-
dc.typeArticle-
dc.identifier.doi10.1109/ICCCN49398.2020.9209657-
dc.relation.page1-9-
dc.relation.journalProceedings - International Conference on Computer Communications and Networks, ICCCN-
dc.contributor.googleauthorKarasek, Daniel Y.-
dc.contributor.googleauthorKim, Jeehyeong-
dc.contributor.googleauthorKemmoe, Victor Youdom-
dc.contributor.googleauthorBhuiyan, Md Zakirul Alam-
dc.contributor.googleauthorCho, Sunghyun-
dc.contributor.googleauthorSon, Junggab-
dc.sector.campusE-
dc.sector.daehak소프트웨어융합대학-
dc.sector.department컴퓨터학부-
dc.identifier.pidchopro-
dc.identifier.article9209657-
Appears in Collections:
ETC[S] > ETC
Files in This Item:
There are no files associated with this item.
Export
RIS (EndNote)
XLS (Excel)
XML


qrcode

Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.

BROWSE