Computer Science ›› 2016, Vol. 43 ›› Issue (9): 57-60.doi: 10.11896/j.issn.1002-137X.2016.09.010

Previous Articles     Next Articles

Research on Studying Method of Network Anomalous Behaviors Classification Based on Topic Model

MA Zheng-ran, ZHANG Bo-feng and WANG Yong-jun   

  • Online:2018-12-01 Published:2018-12-01

Abstract: A novel approach to learn and identify the anomalous behaviors in network was proposed.Unlike previous work,the intrusion detection problem is mapped into the topic model and a classifier is built.Two kinds of connections,namely normal and anomalous ones,are separated before training the model according to the labels of the connections.By analyzing the effect of the parameters,it shows that α (Dirichlet parameter of topics) and the number of topics have positive correlation with the results of prediction,while β (Dirichlet parameter of feature numbers) has negative correlation with the results of prediction.This model was evaluated using KDDCUP’99 dataset.The result suggests that the prediction accuracy is up to 91.69% which outperforms SVM algorithm in normal and anomalous behaviors classification.

Key words: Topic model,Anomalous behavior,Classifier

[1] Garcia-Teodoro P,Diaz-Verdejo J,Macia-Fernandez G,et al.Anomaly-based network intrusion detection:Techniques,systems and challenges[J].Computers & Security,2009,28(1/2):18-28
[2] Blei D M,Ng A Y,Jordan M I.Latent dirichlet allocation[J].J.Mach.Learn.Res.,2003,3:993-1022
[3] Blei D M.Probabilistic topic models[J].Commun.ACM,2012,55(4):77-84
[4] Fei-Fei L,Perona P.A bayesian hierarchical model for learning natural scene categories[C]∥IEEE Computer Society Confe-rence on Computer Vision and Pattern Recognition,2005(CVPR 2005).IEEE,2005,2:524-531
[5] Cramer,Christopher,Carin L.Bayesian topic models for describing computer network behaviors[C]∥2011 IEEE International Conference on Acoustics,Speech and Signal Processing (ICASSP).IEEE,2011:1888-1891
[6] Newton B D.Anomaly Detection in Network Traffic Traces Using Latent Dirichlet Allocation.http://www.cs.unc.edu/~bn/BenNetwonFinalProjectReport.pdf
[7] Huang J,Kalbarczyk Z,Nicol D M.Knowledge Discovery from Big Data for Intrusion Detection Using LDA[C]∥2014 IEEE International Congress on Big Data (BigData Congress).IEEE,2014:760-761
[8] Kasliwal B,Bhatia S,Saini S,et al.A hybrid anomaly detection model using G-LDA[C]∥2014 IEEE International Advance Computing Conference (IACC).IEEE,2014:288-293
[9] http://kdd.ics.uci.edu/databases/kddcup 99/kddcup99.html

No related articles found!
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!