Concept-drift based identification of suspicious activity at specific IP addresses using machine learning

3Citations
Citations of this article
14Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Network Intrusion detection systems(IDS), especially those that monitor Denial of Service(DoS) attack, aim at monitoring the network traffic continuously in order to identify suspicious activity possibly initiated at one or more nodes at specific IP addresses. Traditional anomaly detection based IDS methods rely on preset bounds on the magnitude of network traffic based on statistical measures and hence are not programmable based on the changes in the network traffic dynamics. The authors proposed a methodology for monitoring the changes in the network traffic received from individual source nodes based on concept drift in order to identify suspicious activity at specific nodes. The framework applies machine learning techniques to capture the normal traffic patterns of various source nodes and accordingly defines lower and upper bounds dynamically for each node. Based on the temporal analysis in successive time windows, it is able to discriminate an abrupt change from a gradual change in the magnitude of traffic received in a time window from a node to identify suspicious activity at the corresponding IP address. The effectiveness of the methodology is tested on real world data.

Cite

CITATION STYLE

APA

Rajeswari, P. V. N., & Shashi, M. (2019). Concept-drift based identification of suspicious activity at specific IP addresses using machine learning. International Journal of Recent Technology and Engineering, 8(3), 6651–6655. https://doi.org/10.35940/ijrte.C5699.098319

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free