conformal clustering and its application to botnet traffic
play

Conformal Clustering and its Application to Botnet Traffic - PowerPoint PPT Presentation

Conformal Clustering and its Application to Botnet Traffic Giovanni Cherubin, Ilia Nouretdinov, Alexander Gammerman Roberto Jordaney, Zhi Wang, Davide Papini, Lorenzo Cavallaro Netflow, network traces Internet Bot TCP/ netflow Date


  1. Conformal Clustering and its Application to Botnet Traffic Giovanni Cherubin, Ilia Nouretdinov, Alexander Gammerman Roberto Jordaney, Zhi Wang, Davide Papini, Lorenzo Cavallaro

  2. Netflow, network traces Internet Bot TCP/ netflow Date Duration IP_src Port_src IP_dst Port_dst UDP Sent Recv Sent Recv Tot Tot Flags… Packets Packets Bytes Bytes Packets Bytes

  3. Netflow, network traces TCP/ Sent Date Duration Port_dst … UDP Bytes netflow_1 1248089563 2939 TCP 503 445 netflow_2 1248089702 51 TCP 354 139 …

  4. Conformal Predictor Conformal Predictor D, z n , A p n : p-value Does z n conform D for 1- ε confidence?

  5. CP for anomaly detection [Laxhammar11, Smith14] x 2 x 1

  6. Conformal Clustering • Conformal Predictors in unsupervised setting. • Controls the objects left outside the clusters. • Regulates the “depth” of clusters.

  7. training objects x 2 x 1

  8. training objects x 2 x 1

  9. p-values grid 0.1 0.3 0.2 0.1 0.0 0.1 0.3 … x 2 x 1

  10. respect to ε =0.1 x 2 x 1

  11. neighbouring rule x 2 x 1

  12. test set x 2 x 1

  13. clusters x 2 x 1

  14. Our Approach • Each network trace produces a feature vector. • Normalisation. • Dimensionality reduction ( t-SNE ). • Non-conformity measures: k-NN , KDE . • Performance measures: Purity , Average P-Value.

  15. Performance Measures Purity ! • How “pure” are the clusters. • For the same ε the number of clusters is not influenced. Average P-Value ! 0.1 0.3 0.2 0.1 0.0 • Efficiency criterion. … 0.1 0.3 • Size of the prediction set. • The smaller the prediction set the better.

  16. Results ( ε =0.2) k-NN non-conformity measure k 1 2 3 4 5 … 10 APV 0.129 0.139 0.141 0.147 0.160 0.193 Purity 0.99 0.97 0.97 0.96 0.96 0.92 KDE (Gaussian kernel) non-conformity measure h 0.001 0.005 0.01 0.05 0.1 … 1.0 APV 0.404 0.332 0.299 0.165 0.130 0.221 Purity 1.00 0.98 1.00 0.99 0.99 0.92

  17. Future work • Avoid dimensionality reduction, reduce complexity. • New criteria of accuracy. • New non-conformity measures based on previous work in botnets detection (e.g.: BotFinder). • Detection: “malicious” and “benign” data.

  18. Bibliography • [Vovk05] V. Vovk et al., Algorithmic learning in a random world. Springer, 2005. • [Maaten08] L. van der Maaten et al., Visualizing data using t-SNE. Journal of Machine Learning Research, 2008. • [Laxhammar11] R. Laxhammar et al., Sequential conformal anomaly detection in trajectories based on hausdorff distance, 2011. • [Lei13] J. Lei et al., A conformal prediction approach to explore functional data, 2013. • [Smith14] J. Smith et al., Anomaly Detection of Trajectories with Kernel Density Estimation by Conformal Prediction. Artificial Intelligence Applications and Innovations, Springer, 2014.

  19. Thanks

  20. Conformal Clustering and its Application to Botnet Traffic Giovanni Cherubin, Ilia Nouretdinov, Alexander Gammerman Roberto Jordaney, Zhi Wang, Davide Papini, Lorenzo Cavallaro

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend