Skip to main content

Unsupervised Anomaly Detection Using a New Knowledge Graph Model for Network Activity and Events

  • Conference paper
  • First Online:
Machine Learning for Networking (MLN 2021)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 13175))

Included in the following conference series:

Abstract

The activity and event network (AEN) is a new knowledge graph used to develop and maintain a model for a whole network under monitoring and the relationships between the different network entities as they change through time. In this paper, we show how the AEN graph model can be used for threat identification by introducing an unsupervised anomaly detection model that leverages the probabilistic characteristics of the graph and the bits of meta rarity metric. A series of statistical features and underlying distributions are computed based on the graphical model of network activity and events. The anomaly scores of events are calculated by applying the bits of meta rarity to the aforementioned feature model and underlying distributions. Experimental evaluation is conducted a public cloud-based IDS yielding encouraging performance results.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 44.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 59.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Aldribi, A., Traore, I., Moa, B.: Data sources and datasets for cloud intrusion detection modeling and evaluation. In: Mishra, B.S.P., Das, H., Dehuri, S., Jagadev, A.K. (eds.) Cloud Computing for Optimization: Foundations, Applications, and Challenges. SBD, vol. 39, pp. 333–366. Springer, Cham (2018). https://doi.org/10.1007/978-3-319-73676-1_13

    Chapter  Google Scholar 

  2. Aldribi, A., Traore, I., Moa, B.: Hypervisor-based cloud intrusion detection through online multivariate statistical change tracking. Comput. Secur. 88, 101646 (2020)

    Article  Google Scholar 

  3. Ferragut, E., Laska, J., Bridges, R.: A new, principled approach to anomaly detection. In: Proceedings of the 2012 11th International Conference on Machine Learning and Applications (ICMLA 2012) (2012)

    Google Scholar 

  4. Giura, P., Wang, W.: A context-based detection framework for advanced persistent threats. In: 2012 International Conference on Cyber Security, December 2012, pp. 69–74

    Google Scholar 

  5. Luh, R., Marschalek, S., Kaiser, M., Janicke, H., Schrittwieser, S.: Semantics-aware detection of targeted attacks: a survey. J. Comput. Virol. Hack. Techniq. 13(1), 47–85 (2017)

    Article  Google Scholar 

  6. Sommer, R., Paxson, V.: Outside the closed world: on using machine learning for network intrusion detection. In: Proceedings of the 2010 IEEE Symposium on Security and Privacy (SP 2010), Washington, 2010, pp. 305–316. IEEE Computer Society (2010)

    Google Scholar 

  7. Tandon, G., Chan, P.K.: Tracking user mobility to detect suspicious behavior. In: Proceedings of the 2009 SIAM International Conference on Data Mining, pp. 871–882 (2009)

    Google Scholar 

  8. Traore, I., Quinan, P.G., Yousef, W.: The activity and event network (AEN) model: graph elements and construction. Technical report, ISOT lab, ECE Department, University of Victoria (2020)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Issa Traore .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2022 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Quinan, P.G., Traore, I., Gondhi, U.R., Woungang, I. (2022). Unsupervised Anomaly Detection Using a New Knowledge Graph Model for Network Activity and Events. In: Renault, É., Boumerdassi, S., Mühlethaler, P. (eds) Machine Learning for Networking. MLN 2021. Lecture Notes in Computer Science, vol 13175. Springer, Cham. https://doi.org/10.1007/978-3-030-98978-1_8

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-98978-1_8

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-98977-4

  • Online ISBN: 978-3-030-98978-1

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics