Title | ||
---|---|---|
Evolving Cauchy Possibilistic Clustering And Its Application To Large-Scale Cyberattack Monitoring |
Abstract | ||
---|---|---|
This paper gives the idea of large-scale monitoring for cyberattacks using evolving Cauchy possibilistic clustering (eCauchy). The idea of density based clustering is appealing when the data samples are highly noisy and when also the outliers appears frequently. The basic measure of density in recursive form can be modified in a way to be applied on classification problems such as large-scale monitoring for cyberattacks. The algorithm is in on-line form to deal with the data streams and is therefore appropriate for dealing with big-data problems. The development of density as a measure of similarity follows from Cauchy density and is similar to the typicality defined in the possibilistic clustering approach. The described eCauchy clustering deals with just few tuning parameters, such as maximal density. The algorithm evolves the structure during operation by adding and removing the clusters. This is appropriate for data granulation which is of great importance in the case of the clusters which are of different sizes and shapes. In the proposed large-scale monitoring system, darknet sensor packets within a certain period are transformed into 17 traffic features and they are categorized by eCauchy in an on-line fashion. To evaluate the proposed darknet monitoring system, a large set of TCP and UDP packets collected from January 2nd 2016 to March 1st 2016 (60 days) with the NICT /16 darknet sensor are used for evaluation. Our experimental results demonstrate that the proposed monitoring system can detect DDoS backscatter with more than 98% accuracy for TCP packets and non-DDoS backscatter with 72.8% accuracy for UDP packets. The proposed system can learn and predict quite fast, 12.6 sec. for TCP and 312.6 sec. for UDP. |
Year | Venue | Field |
---|---|---|
2017 | 2017 IEEE SYMPOSIUM SERIES ON COMPUTATIONAL INTELLIGENCE (SSCI) | Data mining,Data stream mining,Denial-of-service attack,Darknet,Computer science,Network packet,Outlier,Cauchy distribution,Cluster analysis,Recursion |
DocType | Citations | PageRank |
Conference | 0 | 0.34 |
References | Authors | |
0 | 6 |
Name | Order | Citations | PageRank |
---|---|---|---|
Igor Skrjanc | 1 | 354 | 52.47 |
Seiichi Ozawa | 2 | 229 | 33.89 |
Dejan Dovzan | 3 | 117 | 8.18 |
Tao Ban | 4 | 102 | 25.58 |
Junji Nakazato | 5 | 22 | 6.01 |
Jumpei Shimamura | 6 | 6 | 4.28 |