Network traffic classification for security analysis

Mark Boger, Tianyuan Liu, Jacqueline Ratliff, William Nick, Xiaohong Yuan, Albert Esterline

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

We used unsupervised machine learning to identify anomalous patterns of network traffic that suggest intrusion. Such techniques allow one to classify network traffic into clusters that emerge from the training data and do not require that signatures already be known. Data is from the National Collegiate Cybersecurity Defense Competition (NCCDC). All but the TCP connections were filtered out, and the features extracted from the remaining data included characteristics of individual connections as well as patterns across time within a sliding window. The learning technique was k-means, with k = 5 giving the most natural and revealing partition of the data. The results bore out the following two hypotheses consistent with the literature: (1) most network traffic is normal, only a certain percentage being malicious; (2) the traffic from an attack is statistically different from normal traffic.

Original languageEnglish
Title of host publicationSoutheastCon 2016
PublisherInstitute of Electrical and Electronics Engineers Inc.
ISBN (Electronic)9781509022465
DOIs
StatePublished - Jul 7 2016
Externally publishedYes
EventSoutheastCon 2016 - Norfolk, United States
Duration: Mar 30 2016Apr 3 2016

Publication series

NameConference Proceedings - IEEE SOUTHEASTCON
Volume2016-July
ISSN (Print)1091-0050
ISSN (Electronic)1558-058X

Conference

ConferenceSoutheastCon 2016
Country/TerritoryUnited States
CityNorfolk
Period03/30/1604/3/16

Keywords

  • Cyber security
  • Intrusion Detection
  • Machine Learning

Fingerprint

Dive into the research topics of 'Network traffic classification for security analysis'. Together they form a unique fingerprint.

Cite this