The ability to detect an anomalous network traffic – even if it is slightly different than a normal one – becomes an important aspect of early detection of cyber attacks. Processes of monitoring and analyzing network data should not only provide accurate classifications of network status, but also detect early symptoms of unusual activities in a network. This would lead to a better understanding of suspicious actions, and enable triggering of prevention actions. In this paper, we propose a system that uses multiple classifiers together with elements of evidence theory to identify anomalous network traffic and detect any deviation from a normal network behaviour. The obtained classification results are equipped with confidence levels. The individual classifiers are constructed with different Machine Learning techniques based on data collected with a developed network monitoring software. The data includes multiple features providing a comprehensive view of network traffic. The results of evaluation of a system implementing the proposed approach are discussed.
CITATION STYLE
Mattar, A., & Reformat, M. Z. (2018). Detecting anomalous network traffic using evidence theory. In Advances in Intelligent Systems and Computing (Vol. 642, pp. 493–504). Springer Verlag. https://doi.org/10.1007/978-3-319-66824-6_43
Mendeley helps you to discover research relevant for your work.