Abstract
In the existing approaches of multifarious knowledge based anomaly detection for network traffic, the priori knowledge labelled by human experts has to be consecutively updated for identification of new anomalies. Because anomalies usually show different patterns from the majority of network activities, it is hard to detect them based on the priori knowledge. Unsupervised anomaly detection using autonomous techniques without any priori knowledge is an effective strategy to overcome this drawback. In this paper, we propose a novel model of Unsupervised Anomaly Detection approach based on Artificial Immune Network (UADAIN) that consists of unsupervised clustering, cluster partition and anomaly detection. Our model uses the aiNet based unsupervised clustering approach to generate cluster centroids from network traffic, and the Cluster Centroids based Partition algorithm (CCP) then coarsely partition cluster centroids in the training phase as the self set (normal rules) and antibody set (anomalous rules). In test phase, to keep consecutive evolution of selves and antibodies, we introduce the Immune Network based Anomaly Detection model (INAD) to automatically learn and evolve the self set and antibody set. To evaluate the effectiveness of UADAIN, we conduct simulation experiments on ISCX 2012 IDS dataset and NSL-KDD dataset. In comparison with two popular anomaly detection approaches based on K-means clustering and aiNet-HC clustering, respectively, the experiment results demonstrate that UADAIN achieves better detection performance in detecting anomalies of network traffic.





Similar content being viewed by others
References
Leung K, Leckie C (2005) Unsupervised anomaly detection in network intrusion detection using clusters. In: Proceedings of the Twenty-eighth Australasian conference on Computer Science Vol 38, pp 333–342. Australian Computer Society, Inc
Tan Z, Jamdagni A, He X, Nanda P, Liu RP, Jiankun H (2015) Detection of denial-of-service attacks based on computer vision techniques. IEEE Trans Comput 64(9):2519–2533
Garg S, Kaur K, Kumar N, Rodrigues JJPC (2019) Hybrid deep learning-based anomaly detection scheme for suspicious flow detection in sdn: a social multimedia perspective. IEEE Trans Multimed 21(3):566–578
Shon T, Moon J (2007) A hybrid machine learning approach to network anomaly detection. Inf Sci 177(18):3799–3821
Tolga E, Serdar KS (2020) Unsupervised anomaly detection with lstm neural networks. IEEE Trans Neural Netw Learn Syst 31(8):3127–3141
Garg S, Kaur K, Kumar N, Kaddoum G, Zomaya AY, Rajiv R (2019) A hybrid deep learning-based model for anomaly detection in cloud datacenter networks. IEEE Trans Netw Serv Manage 16(3):924–935
Anderson HH, Luiz FC, Lucas DHS, Taufik A, Proenca ML Jr (2018) Network anomaly detection system using genetic algorithm and fuzzy logic. Expert Syst Appl 92:390–402
Chandola V, Banerjee A, Kumar V (2009) Anomaly detection: a survey. ACM Comput Surv (CSUR) 41(3):15
Jadidi Z, Muthukkumarasamy V, Sithirasenan E, Singh K (2015) Flow-based anomaly detection using semisupervised learning. In: Signal processing and communication systems (ICSPCS), 2015 9th international conference on, IEEE. pp 1–5
Bhuyan MH, Bhattacharyya DK, Kalita JK (2014) Towards an unsupervised method for network anomaly detection in large datasets. Comput Inf 33(1):1–34
Gogoi P, Borah B, Bhattacharyya DK (2010) Anomaly detection analysis of intrusion data using supervised and unsupervised approach. J Converg Inf Technol 5(1):95–110
Mazel J, Casas P, Fontugne R, Fukuda K, Owezarski P (2015) Hunting attacks in the dark: clustering and correlation analysis for unsupervised anomaly detection. Int J Netw Manage 25(5):283–305
Mazel J (2011)Unsupervised network anomaly detection. Thesis
Casas P, Mazel J, Owezarski P (2011) Unada: unsupervised network anomaly detection using sub-space outliers ranking. International conference on research in networking. Springer, Berlin, pp 40–51
Portnoy L, Eskin E, Stolfo S (2001)Intrusion detection with unlabeled data using clustering. In: In Proceedings of ACM CSS workshop on data mining applied to security (DMSA-2001)
Eskin E, Arnold A, Prerau M, Portnoy L, Stolfo S (2002)A geometric framework for unsupervised anomaly detection, pp 77–101. Springer, Berlin
Mnz G, Li S, Carle G (2007) Traffic anomaly detection using k-means clustering. GI/ITG Workshop MMBnet
Fang L, Le-Ping L (2005) Unsupervised anomaly detection based n an evolutionary artificial immune network. Workshops on applications of evolutionary computation. Springer, Berlin, pp 166–174
Dromard J, Roudiere G, Owezarski P (2016) Online and scalable unsupervised network anomaly detection method. IEEE Trans Netw Serv Manage 14(1):34–47
Lau H, Timmis J, Bate I (2009) Anomaly detection inspired by immune network theory: a proposal. In: 2009 IEEE congress on evolutionary computation, pp 3045–3051. IEEE
Li K-L, Huang H-K, Tian S-F, Xu W (2003) Improving one-class svm for anomaly detection. In: Machine learning and cybernetics, 2003 international conference on, vol 5, pp 3077–3081. IEEE
Ippoliti D, Jiang C, Ding Z, Zhou X (2016) Online adaptive anomaly detection for augmented network flows. ACM Trans Autonom Adapt Syst (TAAS) 11(3):17
Shyu M-L, Chen S-C, Sarinnapakorn K, Chang LW (2003) A novel anomaly detection scheme based on principal component classifier. Report, DTIC Document
Lakhina A, Crovella M, Diot C (2005) Mining anomalies using traffic feature distributions. ACM SIGCOMM Comput Commun Rev 35:217–228
Huang L, Nguyen XL, Garofalakis M, Jordan MI, Joseph A, Taft N (2006) In-network pca and anomaly detection. In: NIPS, pp 617–624
Syarif I, Prugel-Bennett A, Wills G (2012) Unsupervised clustering approach for network anomaly detection. International conference on networked digital technologies. Springer, Berlin, pp 135–145
Zanero S, Savaresi SM (2004) Unsupervised learning techniques for an intrusion detection system. In: Proceedings of the 2004 ACM symposium on applied computing, pp 412–419. ACM
Parsons L, Haque E, Liu H (2004) Subspace clustering for high dimensional data: a review. ACM SIGKDD Explor Newsl 6(1):90–105
Casas P, Mazel J, Owezarski P (2012) Unsupervised network intrusion detection systems: detecting the unknown without knowledge. Comput Commun 35(7):772–783
Dromard J, Roudire G, Owezarski P (2015) Unsupervised network anomaly detection in real-time on big data. In: East European conference on advances in databases and information systems, pp 197–206. Springer, Berlin
Yang C, Deng F, Yang H (2007) An unsupervised anomaly detection approach using subtractive clustering and hidden markov model. In: Communications and networking in China, 2007. CHINACOM’07. Second International Conference on, pp 313–316. IEEE
Leon E, Nasraoui O, Gomez J (2004) Anomaly detection based on unsupervised niche clustering with application to network intrusion detection. In: Evolutionary Computation, 2004. CEC2004. Congress on, vol 1, pp 502–508. IEEE
de Castro LN, von Zuben FJ (2001) ainet: an artificial immune network for data analysis. Data Min Heuristic Approach 2001(1):231–259
Timmis J, Hone A, Stibor T, Clark E (2008) Theoretical advances in artificial immune systems. Theoret Comput Sci 403(1):11–32
Duma M, Twala B (2019) Sparseness reduction in collaborative filtering using a nearest neighbour artificial immune system with genetic algorithms. Expert Syst Appl 132:110–125
Dasgupta D, Yu S, Majumdar NS (2005) Milacmultilevel immune learning algorithm and its application to anomaly detection. Soft Comput 9(3):172–184
Seredynski F, Bouvry P (2007) Anomaly detection in tcp/ip networks using immune systems paradigm. Comput Commun 30(4):740–749
Li D, Liu S, Zhang H (2015) A negative selection algorithm with online adaptive learning under small samples for anomaly detection. Neurocomputing 149(B):515–525
Shi YQ, Li R, Peng X, Yue G (2016) Network security situation prediction approach based on clonal selection and scgm(1 1)c model. J Int Technol 17(3):421–429
Bo Y, Meifang Y (2021) Data-driven network layer security detection model and simulation for the internet of things based on an artificial immune system. Neural Comput Appl 33(2):655–666
Qian S, Ye Y, Jiang B, Wang J (2016) Constrained multiobjective optimization algorithm based on immune system model. IEEE Trans Cybern 46(9):2056–2069
Shi YQ, Li R, Zhang Y, Peng X (2015) An immunity-based time series prediction approach and its application for network security situation. Intell Serv Robot 8(1):1–22
Dudek G (2017) Artificial immune system with local feature selection for short-term load forecasting. IEEE Trans Evol Comput 21(1):116–130
Li T (2005) An immunity based network security risk estimation. Sci China Ser F Inf Sci 48(5):557–578
Alizadeh E, Meskin N, Khorasani K (2016) A negative selection immune system inspired methodology for fault diagnosis of wind turbines. IEEE Trans Cybern 47(11):3799–3813
Jerne NK (1974) Towards a network theory of the immune system. Annales d’immunologie 125:373–389
Rassam MA, Maarof MA (2012) Artificial immune network clustering approach for anomaly intrusion detection. J Adv Inf Technol 3(3):147–154
Shiravi A, Shiravi H, Tavallaee M, Ghorbani AA (2012) Toward developing a systematic approach to generate benchmark datasets for intrusion detection. Comput Security 31(3):357–374
Tavallaee M, Bagheri E, Lu W, Ghorbani A-A (2009) A detailed analysis of the kdd cup 99 data set. 2009 IEEE symposium on computational intelligence for security and defense applications, pp 1–6
Sheikhan M, Jadidi Z (2014) Flow-based anomaly detection in high-speed links using modified gsa-optimized neural network. Neural Comput Appl 24(3–4):599–611
Li W, Canini M, Moore AW, Bolla R (2009) Efficient application identification and the temporal and spatial stability of classification schema. Comput Netw 53(6):790–809
Iglesias F, Zseby T (2015) Analysis of network traffic features for anomaly detection. Mach Learn 101(1–3):59–84
Maloof MA (2005) Machine learning and data mining for computer security: methods and applications. pp 23–45. Springer-Verlag, New York
Acknowledgements
This study was funded by the National Natural Science Foundation of China under Grant No. 62172182, China Scholarship Council, Australian Research Council Discovery Project DP150104871, Hunan Provincial Natural Science Foundation of China under Grant No. 2020JJ4490, the Scientific Research Fund of Hunan Provincial Education Department of China under Grant No.18A449.
Author information
Authors and Affiliations
Corresponding author
Ethics declarations
Conflict of interest
The authors declare that they have no conflict of interest.
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Shi, Y., Shen, H. Unsupervised anomaly detection for network traffic using artificial immune network. Neural Comput & Applic 34, 13007–13027 (2022). https://doi.org/10.1007/s00521-022-07156-x
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s00521-022-07156-x