Talks and Poster Presentations (with Proceedings-Entry):
F. Iglesias Vazquez, A. Hartl, T. Zseby, A. Zimek:
"Are Network Attacks Outliers? A Study of Space Representations and Unsupervised Algorithms";
Talk: MLCS Workshop on Machine Learning for CyberSecurity, ECMLPKDD,
- 09-20-2019; in: "MLCS Workshop on Machine Learning for CyberSecurity",
Among network analysts, "anomaly" and "outlier" are terms commonly associated to network attacks. Attacks are outliers (or anomalies) in the sense that they exploit communication protocols with novel infiltration techniques against which there are no defenses yet. But due to the dynamic and heterogeneous nature of network traffic, attacks may look like normal traffic variations. Also attackers try to make attacks indistinguishable from normal traffic. Then, are network attacks actual anomalies? This paper tries to answer this important question from analytical perspectives. To that end, we test the outlierness of attacks in a recent, complete dataset for evaluating Intrusion Detection by using five different feature vectors for network traffic representation and five different outlier ranking algorithms. In addition, we craft a new feature vector that maximizes the discrimination power of outlierness. Results show that attacks are significantly more outlier than legitimate traffic -specially in representations that profile network endpoints-, although attack and non-attack outlierness distributions strongly overlap. Given that network spaces are noisy and show density variations in non-attack spaces, algorithms that measure outlierness locally are less effective than algorithms that measure outlierness with global distance estimations. Our research confirms that unsupervised methods are suitable for attack detection, but also that they must be combined with methods that leverage pre-knowledge to prevent high false positive rates. Our findings expand the basis for using unsupervised methods in attack detection.
outlier detection, network traffic analysis, feature selection
Created from the Publication Database of the Vienna University of Technology.