z-logo
open-access-imgOpen Access
Unsupervised Monitoring of Network and Service Behaviour Using Self Organizing Maps
Author(s) -
Duc Duy Le,
A. Nur Zincir-Heywood,
Malcolm I. Heywood
Publication year - 2018
Publication title -
journal of cyber security and mobility
Language(s) - English
Resource type - Journals
SCImago Journal Rank - 0.198
H-Index - 9
eISSN - 2245-4578
pISSN - 2245-1439
DOI - 10.13052/2245-1439.812
Subject(s) - botnet , computer science , unsupervised learning , anomaly detection , analytics , intrusion detection system , service (business) , data mining , visualization , machine learning , web analytics , artificial intelligence , web service , the internet , world wide web , web intelligence , web development , economy , economics
Botnets represent one of the most destructive cybersecurity threats. Given the evolution of the structures and protocols botnets use, many machine learning approaches have been proposed for botnet analysis and detection. In the literature, intrusion and anomaly detection systems based on unsupervised learning techniques showed promising performances. This paper investigates the capability of the Self Organizing Map (SOM), an unsupervised learning technique as a data analytics system. In doing so, the aim is to understand how far such an approach could be pushed to analyze the network traffic, and to detect malicious behaviours in the wild. To this end, three different unsupervised SOM training scenarios for different data acquisition conditions are designed, implemented and evaluated. The approach is evaluated on publicly available network traffic (flows) and web server access (web requests) datasets. The results show that the approach has a high potential as a data analytics tool on unknown traffic/web service requests, and unseen attack behaviours. Malicious behaviours both on network and service datasets used could be identified with a high accuracy. Furthermore, the approach achieves comparable performances to that of popular supervised and unsupervised learning methods in the literature. Last but not the least, it provides unique visualization capabilities for enabling a simple yet effective network/service data analytics for security management.  

The content you want is available to Zendy users.

Already have an account? Click here to sign in.
Having issues? You can contact us here