Other formats:
BibTeX
LaTeX
RIS
@article{34763, author = {Nia, Mehran Alidoost and Atani, Reza Ebrahimi and Fabian, Benajmin and Babulak, Eduard}, article_number = {Issue 6}, keywords = {anomaly detection; network security; real-time threat; self-avoiding random walk; unknown threat detection}, language = {eng}, issn = {1939-0122}, journal = {Security and Communication Networks}, title = {On detecting unidentified network traffic using pattern-based random walk}, volume = {Volume 9}, year = {2016} }
TY - JOUR ID - 34763 AU - Nia, Mehran Alidoost - Atani, Reza Ebrahimi - Fabian, Benajmin - Babulak, Eduard PY - 2016 TI - On detecting unidentified network traffic using pattern-based random walk JF - Security and Communication Networks VL - Volume 9 IS - Issue 6 SP - 3509-3526 EP - 3509-3526 PB - John Wiley and Sons Inc. SN - 19390122 KW - anomaly detection KW - network security KW - real-time threat KW - self-avoiding random walk KW - unknown threat detection N2 - This paper presents a new approach to network traffic control based on the pattern theorem. In order to generate unique detection patterns for the process of traffic analysis, a self-avoiding walk algorithm is used. During data processing and analysis, the traffic patterns are adapted dynamically in real-time. The modified traffic patterns are systematically analyzed using a threat database. In this work, a threshold is set to distinguish and trigger critical levels of threats. The matching process is terminated under each of the three conditions: (i) pattern matching rate is up to 80%; (ii) pattern matching rates of at least five various threats are up to 50%; and (iii) pattern matching is enhanced up to 50% for each matched pattern using an implicit combination of threat coefficients. Our experimental results show that in the worst-case scenario, the true detection rate of malicious traffic is higher than 69%, and in the best situation, it would be about 95% for the same malicious traffic. Also, the precision of false detection for trusted patterns is negligible. Copyright © 2016 John Wiley & Sons, Ltd. Copyright © 2016 John Wiley & Sons, Ltd. ER -
NIA, Mehran Alidoost, Reza Ebrahimi ATANI, Benajmin FABIAN and Eduard BABULAK. On detecting unidentified network traffic using pattern-based random walk. \textit{Security and Communication Networks}. John Wiley and Sons Inc., 2016, Volume 9, Issue 6, p.~3509-3526. ISSN~1939-0122.
|