Skip to main content

Detecting Anomalous Network Traffic Using Evidence Theory

  • Conference paper
  • First Online:
Advances in Fuzzy Logic and Technology 2017 (EUSFLAT 2017, IWIFSGN 2017)

Abstract

The ability to detect an anomalous network traffic – even if it is slightly different than a normal one – becomes an important aspect of early detection of cyber attacks. Processes of monitoring and analyzing network data should not only provide accurate classifications of network status, but also detect early symptoms of unusual activities in a network. This would lead to a better understanding of suspicious actions, and enable triggering of prevention actions.

In this paper, we propose a system that uses multiple classifiers together with elements of evidence theory to identify anomalous network traffic and detect any deviation from a normal network behaviour. The obtained classification results are equipped with confidence levels. The individual classifiers are constructed with different Machine Learning techniques based on data collected with a developed network monitoring software. The data includes multiple features providing a comprehensive view of network traffic. The results of evaluation of a system implementing the proposed approach are discussed.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Bhuyan, M., Bhattacharyya, D.K., Kalita, J.: Network anomaly detection: methods systems and tools. IEEE Commun. Surv. Tutorials 16, 303–336 (2014)

    Article  Google Scholar 

  2. Chan, P.K., Mahoney, M.V., Arshad, M.H.: Learning rules and clusters for anomaly detection in network traffic. In: Kumar, V., Srivastava, J., Lazarevic, A. (eds.) Managing Cyber Threats: Issues Approaches Challenges, pp. 81–99. Springer (2005)

    Google Scholar 

  3. Chandola, V., Banerjee, A., Kumar, V.: Anomaly detection: a survey. ACM Comput. Surv. 41, 15:1–15:58 (2009)

    Article  Google Scholar 

  4. Denning, D.E.: An intrusion-detection model. IEEE Trans. Softw. Eng. 13, 222–232 (1987)

    Article  Google Scholar 

  5. Gogoi, P., Bhattacharyya, D.K., Borah, B., Kalita, J.K.: MLH-IDS: a multi-level hybrid intrusion detection method. Comput. J. 57, 602–623 (2014)

    Article  Google Scholar 

  6. Ibrahim, H.E., Badr, S.M., Shaheen, M.A.: Adaptive layered approach using machine learning techniques with gain ratio for intrusion detection systems. Int. J. Comput. App. 56, 1016 (2012)

    Google Scholar 

  7. Leung, K., Leckie, C.: Unsupervised anomaly detection in network intrusion detection using clusters. In: Australasian Conference on Computer Science, vol. 38, pp. 333–342 (2005)

    Google Scholar 

  8. Lu, H., Xu, J.: Three-level hybrid intrusion detection system. In: 9th International Conference on Information Engineering and Computer Science, pp. 1–4 (2009)

    Google Scholar 

  9. Nguyen, T., Armitage, G.: A survey of techniques for internet traffic classification using machine learning. IEEE Commun. Surv. 10, 56–76 (2008)

    Article  Google Scholar 

  10. Patcha, A., Park, J.M.: An overview of anomaly detection techniques: existing solutions and latest technological trends. Comput. Netw. 51, 3448–3470 (2007)

    Article  Google Scholar 

  11. Savage, L.J.: Foundations of Statistics. Wiley, New York (1954)

    MATH  Google Scholar 

  12. Shafer, G.: A Mathematical Theory of Evidence. Princeton University Press, Princeton (1976)

    MATH  Google Scholar 

  13. Smets, Ph.: The concept of distinct evidence. In: IPMU 1992, Palma de Mallorca, Spain, pp. 789–794 (1992)

    Google Scholar 

  14. Smets, Ph, Kennes, R.: The transferable belief model. Artif. Intell. J. 66, 191–234 (1994)

    Article  MathSciNet  MATH  Google Scholar 

  15. Wathiq Laftah, Al.-Y., Othman, Z.A., Nazri, M.Z.A.: Multi-level hybrid support vector machine and extreme learning machine based on modified K-means for intrusion detection system. Expert Syst. App. J. 67, 296–303 (2017)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Marek Z. Reformat .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2018 Springer International Publishing AG

About this paper

Cite this paper

Mattar, A., Reformat, M.Z. (2018). Detecting Anomalous Network Traffic Using Evidence Theory. In: Kacprzyk, J., Szmidt, E., Zadrożny, S., Atanassov, K., Krawczak, M. (eds) Advances in Fuzzy Logic and Technology 2017. EUSFLAT IWIFSGN 2017 2017. Advances in Intelligent Systems and Computing, vol 642. Springer, Cham. https://doi.org/10.1007/978-3-319-66824-6_43

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-66824-6_43

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-66823-9

  • Online ISBN: 978-3-319-66824-6

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics