Network traffic anomaly detection using shallow packet inspection and parallel k-means data clustering

15Citations
Citations of this article
18Readers
Mendeley users who have this article in their library.

Abstract

IT infrastructures around the world are targeted by malicious entities that want to steal data or compromise services. Protection measures for complex computer networks are expensive to deploy and maintain, and often do not offer protection against zero-day exploits. In-depth analysis of incoming and outgoing traffic can be problematic from legal and technical perspectives. The current work explores the possibility of implementing reliable security measures using machine learning algorithms to perform traffic classification. The new framework is mapped on existing parallel hardware and aims to provide a versatile solution for the detection of anomalous behaviour in network traffic through k-means clustering and without performing deep packet inspection. Trace analysis metadata is obtained by exploiting the features available in the pcapng file format. K-means clustering is implemented using multiple parallel APIs and a comparative analysis is presented together with performance considerations.

Cite

CITATION STYLE

APA

Velea, R., Ciobanu, C., Mărgărit, L., & Bica, I. (2017). Network traffic anomaly detection using shallow packet inspection and parallel k-means data clustering. Studies in Informatics and Control, 26(4), 387–396. https://doi.org/10.24846/v26i4y201702

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free