Computer Science ›› 2019, Vol. 46 ›› Issue (8): 178-182.doi: 10.11896/j.issn.1002-137X.2019.08.029

• Information Security • Previous Articles     Next Articles

Network Traffic Anomaly Detection Based on Wavelet Analysis

DU Zhen, MA Li-peng, SUN Guo-zi   

  1. (School of Computer Science,Nanjing University of Posts and Telecommunications,Nanjing 210023,China)
  • Received:2018-07-21 Online:2019-08-15 Published:2019-08-15

Abstract: High-quality feature extraction and anomaly detection of large-scale network traffic data is an important basis for network forensics.The key research and implementation of this paper is the data processing and modeling library in network forensics.A method of network traffic anomaly detection based on wavelet analysis was studied to detect pcap files containing two different injection attacks.The study was implemented on the Windows system,and Python language was used to complete the function code.First,the required training data from a large amount of data are extracted,then the features are extracted from trainning data by using wavelet analysis.Finally,the support vector machine is used for classifier training.Thus,two types of anomaly traffic are identified from the mixed traffic containing normal traffic and abnormal traffic.Qualitative and quantitative experimental results show that the method achieves good classification results,and can provide a way for the improvement of network forensics from the two perspectives of feature extraction and classification analysis

Key words: Anomaly detection, Classification analysis, Feature extraction, Network forensics, Wavelet analysis

CLC Number: 

  • TP391
[1]WANG L,QIAN H L.Computer forensics technology and its development trend[J].Journal of Software,2003,14(9):1635-1644.(in Chinese) 王玲,钱华林.计算机取证技术及其发展趋势[J].软件学报,2003,14(9):1635-1644.
[2]HOU H H.Application research of data mining in computer dy- namic forensics technology[J].Digital Technology and Application,2017,14(8):76-77.(in Chinese) 侯欢欢.数据挖掘在计算机动态取证技术中的应用研究[J].数字技术与应用,2017,14(8):76-77.
[3]HU D H,XIA D R,SHI X L,et al.Network forensics technology research[J].Computer Science,2015,23(b10):1-22.(in Chinese) 胡东辉,夏东冉,史昕岭,等.网络取证技术研究[J].计算机科学,2015,23(b10):1-22.
[4]LAMABA H,GLAZIER T J,SCHMERL B,et al.A model-based approach to anomaly detection in software architectures[C]∥Symposium and Bootcamp on the Science of Security,2016:69-71.
[5]ATEFI K,YAHYA S,REZAEI A,et al.Anomaly detection based on profifie signature in network using machine lear-ning technique∥Region 10 Symposium.2016:71-76.
[6]LEITNER M,RINDERLEB M S.Anomaly detection and visua- lization in generative rbac models[C]∥ACM Symposium on Access Control MODELS and Technologies.2014:41-52.
[7]ZHOU Y J.Network traffic anomaly detection based on data mining in time-series graph[J].Computer Science,2009,36(1):46-50.
[8]BARFORD P,KLINE J,PLONKA D.A signal analysis of network traffic anomalies[C]∥Proc.ACM SIGCOMM Internet Measurement Workshop.Marseille,France,2002:71-82.
[9]LUAN K.Robust detection method for network attacks based on wavelet scale decomposition [J].Electronic Technology and Software Engineering,2016,8(4):9.(in Chinese) 栾凯.基于小波尺度分解的网络攻击稳健检测方法[J].电子技术与软件工程,2016,8(4):9.
[10]MA X H,Cao J P,DONG S F.Wavelet analysis and application.Microcomputer Development,2003,56(1/2):231-262.
[11]Al-QAMMAZ A Y,YUSOF Y,AHAMAD F K.An enhanced discrete wavelet packet transform for feature extraction in electroencephalogram signals[C]∥International Conference.2017:88-93.
[12]AHANI S,GHAEMMAGHAMI S Z,WANG Z J.A sparse representation-based wavelet domain speech steganography method[J].IEEE/ACM Transactions on Audio Speech & Language Processing,2015,23(1):80-91.
[13]ALI S,HUNG C C.An empirical study on feature extraction for the classification of textural and natural images[C]∥International Conference on Research in Adaptive and Convergent Systems.2016:51-55.
[14]ALNASHASH H A,PAUL J S,THAKOR N V.Wavelet entropy method for EEG analysis:application to global brain injury[C]∥International IEEE Embs Conference on Neural Engineering.2016:348-351.
[15]MA X H,CAO J P,DONG S F.Wavelet analysis and application[J].Microcomputer Development,2003,56(1/2):231-262.
[16]WEI L,GNORBANI A A.Network anomaly detection based onwavelet analysis[J].Eurasip Journal on Advances in Signal Processing,2009,1(2003):1-16.
[17]CHEN Z,CHAI K Y,BU S L,et al.A novel anomaly detection system using feature-based MSPCA with sketch[C]∥Wireless and Optical Communication Conference.IEEE,2017:1-6.
[18]SALAGEAN M.Real network traffic anomaly detection based on analytical discrete wavelet transform[C]∥International Conference on Optimization of Electrical and Electronic Equipment.2010:926-931.
[1] XU Tian-hui, GUO Qiang, ZHANG Cai-ming. Time Series Data Anomaly Detection Based on Total Variation Ratio Separation Distance [J]. Computer Science, 2022, 49(9): 101-110.
[2] WANG Xin-tong, WANG Xuan, SUN Zhi-xin. Network Traffic Anomaly Detection Method Based on Multi-scale Memory Residual Network [J]. Computer Science, 2022, 49(8): 314-322.
[3] ZHANG Yuan, KANG Le, GONG Zhao-hui, ZHANG Zhi-hong. Related Transaction Behavior Detection in Futures Market Based on Bi-LSTM [J]. Computer Science, 2022, 49(7): 31-39.
[4] ZENG Zhi-xian, CAO Jian-jun, WENG Nian-feng, JIANG Guo-quan, XU Bin. Fine-grained Semantic Association Video-Text Cross-modal Entity Resolution Based on Attention Mechanism [J]. Computer Science, 2022, 49(7): 106-112.
[5] CHENG Cheng, JIANG Ai-lian. Real-time Semantic Segmentation Method Based on Multi-path Feature Extraction [J]. Computer Science, 2022, 49(7): 120-126.
[6] DU Hang-yuan, LI Duo, WANG Wen-jian. Method for Abnormal Users Detection Oriented to E-commerce Network [J]. Computer Science, 2022, 49(7): 170-178.
[7] LIU Wei-ye, LU Hui-min, LI Yu-peng, MA Ning. Survey on Finger Vein Recognition Research [J]. Computer Science, 2022, 49(6A): 1-11.
[8] GAO Yuan-hao, LUO Xiao-qing, ZHANG Zhan-cheng. Infrared and Visible Image Fusion Based on Feature Separation [J]. Computer Science, 2022, 49(5): 58-63.
[9] SHEN Shao-peng, MA Hong-jiang, ZHANG Zhi-heng, ZHOU Xiang-bing, ZHU Chun-man, WEN Zuo-cheng. Three-way Drift Detection for State Transition Pattern on Multivariate Time Series [J]. Computer Science, 2022, 49(4): 144-151.
[10] WU Yu-kun, LI Wei, NI Min-ya, XU Zhi-cheng. Anomaly Detection Model Based on One-class Support Vector Machine Fused Deep Auto-encoder [J]. Computer Science, 2022, 49(3): 144-151.
[11] ZUO Jie-ge, LIU Xiao-ming, CAI Bing. Outdoor Image Weather Recognition Based on Image Blocks and Feature Fusion [J]. Computer Science, 2022, 49(3): 197-203.
[12] LENG Jia-xu, TAN Ming-pi, HU Bo, GAO Xin-bo. Video Anomaly Detection Based on Implicit View Transformation [J]. Computer Science, 2022, 49(2): 142-148.
[13] REN Shou-peng, LI Jin, WANG Jing-ru, YUE Kun. Ensemble Regression Decision Trees-based lncRNA-disease Association Prediction [J]. Computer Science, 2022, 49(2): 265-271.
[14] ZHANG Ye, LI Zhi-hua, WANG Chang-jie. Kernel Density Estimation-based Lightweight IoT Anomaly Traffic Detection Method [J]. Computer Science, 2021, 48(9): 337-344.
[15] ZHANG Shi-peng, LI Yong-zhong. Intrusion Detection Method Based on Denoising Autoencoder and Three-way Decisions [J]. Computer Science, 2021, 48(9): 345-351.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!