skip to main content
10.1145/3098593.3098594acmconferencesArticle/Chapter ViewAbstractPublication PagescommConference Proceedingsconference-collections
research-article
Free Access

Ensemble-learning Approaches for Network Security and Anomaly Detection

Authors Info & Claims
Published:07 August 2017Publication History

ABSTRACT

The application of machine learning models to network security and anomaly detection problems has largely increased in the last decade; however, there is still no clear best-practice or silver bullet approach to address these problems in a general context. While deep-learning is today a major breakthrough in other domains, it is difficult to say which is the best model or category of models to address the detection of anomalous events in operational networks. We present a potential solution to fill this gap, exploring the application of ensemble learning models to network security and anomaly detection. We investigate different ensemble-learning approaches to enhance the detection of attacks and anomalies in network measurements, following a particularly promising model known as the Super Learner. The Super Learner performs asymptotically as well as the best possible weighted combination of the base learners, providing a very powerful approach to tackle multiple problems with the same technique. We test the proposed solution for two different problems, using the well-known MAWILab dataset for detection of network attacks, and a semi-synthetic dataset for detection of traffic anomalies in operational cellular networks. Results confirm that the Super Learner provides better results than any of the single models, opening the door for a generalization of a best-practice technique for these specific domains.

References

  1. M. Van der Laan, E. C. Polley and A. E. Hubbard, "Super learner", in Statistical applications in genetics and molecular biology, vol. 6 (1), pp. 1--21, 2007.Google ScholarGoogle Scholar
  2. P. Casas, A. D'Alconzo, T. Zseby and M. Mellia, "Big-DAMA: Big Data Analytics for Network Traffic Monitoring and Analysis", in ACM SIGCOMM LANCOMM Workshop, 2016. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. P. Casas, A. D'Alconzo, G. Settanni, P. Fiadino and F. Skopik, "POSTER:(Semi)-Supervised Machine Learning Approaches for Network Security in High-Dimensional Network Data", in ACM CCS, 2016. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. P. Casas, P. Fiadino and A. D'Alconzo, "Machine-learning based approaches for anomaly detection and classification in cellular networks", in TMA, 2016.Google ScholarGoogle Scholar
  5. Y. Freund, R. E. Schapire, Y. Singer and M. K. Warmuth, "Using and combining predictors that specialize", in ACM STOC, 1997. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. J. Hansen, "Combining predictors: Some old methods and a new method", available online at Citeseer, 1998.Google ScholarGoogle Scholar
  7. T. Dietterich, "Ensemble learning", in The handbook of brain theory and neural networks, vol. 2, pp. 110--125, MIT Press, 2002.Google ScholarGoogle Scholar
  8. P. Sollich and A. Krogh, "Learning with ensembles: How overfitting can be useful", in Advances in neural information processing systems, pp. 190--196, 1996. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. R. Fontugne, P. Borgnat, P. Abry and K. Fukuda, "MAWILab: Combining Diverse Anomaly Detectors for Automated Anomaly Labeling and Performance Benchmarking", in ACM CoNEXT, 2010 Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. T. T. T. Nguyen and G. Armitage, "A Survey of Techniques for Internet Traffic Classification using Machine Learning", in IEEE Comm. Surv. & Tut, vol. 10 (4), pp. 56--76, 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. V. Chandola, A. Banerjee and V. Kumar, "Anomaly detection: A survey", in ACM Comput. Surv., vol. 41 (3), pp. 1--58, 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. M. Ahmed, A. Naser Mahmood and J. Hu, "A Survey of Network Anomaly Detection Techniques", in J. Netw. Comput. Appl., vol. 60, pp. 19--31, 2016. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. W. Zhang, Q. Yang and Y. Geng, "A Survey of Anomaly Detection Methods in Networks", in CNMT Symposium, 2009.Google ScholarGoogle ScholarCross RefCross Ref
  14. R. Ravinder Reddy, Y. Ramadevi and K. V. N. Sunitha, "Real Time Anomaly Detection Using Ensembles", in ICISA International Conference, 2014.Google ScholarGoogle Scholar
  15. M. Ozdemir and I. Sogukpinar, "An Android Malware Detection Architecture based on Ensemble Learning", in Trans. on Machine Learning and Artificial Intelligence, vol. 2 (3), pp. 90--106, 2014.Google ScholarGoogle ScholarCross RefCross Ref

Index Terms

  1. Ensemble-learning Approaches for Network Security and Anomaly Detection

      Recommendations

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in
      • Published in

        cover image ACM Conferences
        Big-DAMA '17: Proceedings of the Workshop on Big Data Analytics and Machine Learning for Data Communication Networks
        August 2017
        58 pages
        ISBN:9781450350549
        DOI:10.1145/3098593

        Copyright © 2017 ACM

        Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        • Published: 7 August 2017

        Permissions

        Request permissions about this article.

        Request Permissions

        Check for updates

        Qualifiers

        • research-article
        • Research
        • Refereed limited

        Acceptance Rates

        Overall Acceptance Rate7of11submissions,64%

      PDF Format

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader