Skip to main content

Anomaly Detection in Network Traffic Security Assurance

  • Conference paper
  • First Online:
Engineering in Dependability of Computer Systems and Networks (DepCoS-RELCOMEX 2019)

Abstract

The paper focuses on a selected element of network security assurance, which is anomaly detection in network traffic monitoring. The anomaly detection component is developed as part of Regional Security Operation Center (developed in the RegSOC project) – a local instance of the Security Operational Center (SOC) – to detect incidents or their symptoms in terms of outlier observations in data. The objective of the research is to assess and select for implementation methods and tools satisfying the requirements of the performed RegSOC project. The paper discusses the role and placement of such tools in the general SOC architecture and requirements to be satisfied by these tools in a view of the specific RegSOC project needs. Next, a review of available methods and tools is performed to select the most useful ones. Using the selected tool, a general concept of security analysis component is presented and assessed against the project requirements.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 129.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Jarre, J.M., Snowden, E.: Exit, Electronica 2: The Heart of Noise, Columbia Records (2016)

    Google Scholar 

  2. RegSOC: http://www.ibemag.pl/en/news/item/324-the-regsoc-project-has-started. Accessed 18 Jan 2019

  3. ISO/IEC 27035 Information Technology – Security techniques – Information security incident management. ISO, Geneva (2011)

    Google Scholar 

  4. Logstash: https://www.elastic.co/products/logstash. Accessed 18 Jan 2019

  5. Muniz, J., McIntyre, G., AlFardan, N.: Security Operations Center: Building, Operating, and Maintaining Your SOC. Cisco Press, Indianapolis (2016)

    Google Scholar 

  6. Grubbs, F.E.: Procedures for detecting outlying observations in samples. Technometrics 11(1), 1–21 (1969)

    Article  Google Scholar 

  7. Hawkins, D.M.: Identification of Outliers. Monographs on Applied Probability and Statistics. Springer, Dordrecht (1980)

    Book  Google Scholar 

  8. Barnett, V., Lewis, T.: Outliers in Statistical Data, 3rd edn. Wiley, Chichester (1994)

    MATH  Google Scholar 

  9. Weisberg, S.: Applied Linear Regression. Wiley Series in Probability and Statistics, 3rd edn. Wiley, Hoboken (2005)

    Book  Google Scholar 

  10. Ramaswamy, S., Rastogi, R., Shim, K.: Efficient algorithms for mining outliers from large data sets. SIGMOD Rec. 29(2), 427–438 (2000)

    Article  Google Scholar 

  11. Knorr, E.M., Ng, R.T.: Algorithms for mining distance-based outliers in large datasets. In: Proceedings of the 24th International Conference on Very Large Data Bases, pp. 392–403(1998)

    Google Scholar 

  12. Byers, S., Raftery, A.E.: Nearest-neighbor clutter removal for estimating features in spatial point processes. J. Am. Stat. Assoc. 93(442), 577–584 (1998)

    Article  Google Scholar 

  13. Ester, M., Kriegel, H.P., Sander, J., Xu, X.: A density-based algorithm for discovering clusters in large spatial databases with noise. In: Proceedings of the Second International Conference on Knowledge Discovery and Data Mining, pp. 226–231 (1996)

    Google Scholar 

  14. Boser, B.E., Guyon, I.M., Vapnik, V.N.: A training algorithm for optimal margin classifiers. In: Proceedings of the Fifth Annual Workshop on Computational Learning Theory, pp. 144–152 (1992)

    Google Scholar 

  15. Schoelkopf, B., Williamson, R.C., Smola, A.J., Shawe-Taylor, J., Platt, J.C.: Support vector method for novelty detection. In: Solla, S., Leen, T., Mueller, K. (eds.) Advances in Neural Information Processing Systems, vol. 12, pp. 582–588. MIT Press, Cambridge (2000)

    Google Scholar 

  16. Boriah, S., Chandola, V., Kumar, V.: Similarity measures for categorical data: a comparative evaluation. In: Proceedings of the SIAM International Conference on Data Mining, pp. 243–254 (2008)

    Google Scholar 

Download references

Acknowledgements

RegSOC – Regional Center for Cybersecurity. The project is financed by the Polish National Centre for Research and Development as part of the second CyberSecIdent – Cybersecurity and e-Identity competition (agreement number: CYBERSECIDENT/381690/II/NCBR/2018).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Andrzej Bialas .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Bialas, A., Michalak, M., Flisiuk, B. (2020). Anomaly Detection in Network Traffic Security Assurance. In: Zamojski, W., Mazurkiewicz, J., Sugier, J., Walkowiak, T., Kacprzyk, J. (eds) Engineering in Dependability of Computer Systems and Networks. DepCoS-RELCOMEX 2019. Advances in Intelligent Systems and Computing, vol 987. Springer, Cham. https://doi.org/10.1007/978-3-030-19501-4_5

Download citation

Publish with us

Policies and ethics