"Flow Size Difference" Can Make a Difference: Detecting Malicious TCP Network Flows Based on Benford's Law

09/14/2016
by   Aamo Iorliam, et al.
0

Statistical characteristics of network traffic have attracted a significant amount of research for automated network intrusion detection, some of which looked at applications of natural statistical laws such as Zipf's law, Benford's law and the Pareto distribution. In this paper, we present the application of Benford's law to a new network flow metric "flow size difference", which have not been studied before by other researchers, to build an unsupervised flow-based intrusion detection system (IDS). The method was inspired by our observation on a large number of TCP flow datasets where normal flows tend to follow Benford's law closely but malicious flows tend to deviate significantly from it. The proposed IDS is unsupervised, so it can be easily deployed without any training. It has two simple operational parameters with a clear semantic meaning, allowing the IDS operator to set and adapt their values intuitively to adjust the overall performance of the IDS. We tested the proposed IDS on two (one closed and one public) datasets, and proved its efficiency in terms of AUC (area under the ROC curve). Our work showed the "flow size difference" has a great potential to improve the performance of any flow-based network IDSs.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
06/21/2022

Using EBGAN for Anomaly Intrusion Detection

As an active network security protection scheme, intrusion detection sys...
research
10/03/2018

Generating Labeled Flow Data from MAWILab Traces for Network Intrusion Detection

A growing issue in the modern cyberspace world is the direct identificat...
research
04/07/2023

BS-GAT Behavior Similarity Based Graph Attention Network for Network Intrusion Detection

With the development of the Internet of Things (IoT), network intrusion ...
research
11/08/2019

AutoIDS: Auto-encoder Based Method for Intrusion Detection System

Intrusion Detection System (IDS) is one of the most effective solutions ...
research
05/14/2022

Unsupervised Abnormal Traffic Detection through Topological Flow Analysis

Cyberthreats are a permanent concern in our modern technological world. ...
research
08/10/2022

Collaborative Feature Maps of Networks and Hosts for AI-driven Intrusion Detection

Intrusion Detection Systems (IDS) are critical security mechanisms that ...
research
06/08/2023

Flow-based Network Intrusion Detection Based on BERT Masked Language Model

A Network Intrusion Detection System (NIDS) is an important tool that id...

Please sign up or login with your details

Forgot password? Click here to reset