SlideShare a Scribd company logo
1 of 16
Sequence to Sequence Pattern Learning Algorithm
for Real-time Anomaly Detection in Network Traffic
Gobinath Loganathan∗ , Jagath Samarabandu† and Xianbin Wang‡
Department of Electrical and Computer Engineering
The University of Western Ontario
London, Ontario, N6A 5B9, Canada
∗ lgobinat@uwo.ca, † jagath@uwo.ca, ‡ xianbin.wang@uwo.ca
Outline
1. Introduction
2. Related Work
3. Methodology
4. Tests & Results
5. Conclusion
Introduction
● Network Intrusion - Intentional violation of expected behavior or protocol rule
● A network rule can be defined as a sequence of packets
● Network Intrusion → Anomalous sequential order of packets
Image Credits: https://www.cisco.com/c/en/us/about/press/internet-protocol-journal/back-issues/table-contents-34/syn-flooding-attacks.html
Problem
● Flattened datasets do not capture the sequential relationship
○ KDD 1999 [1] contains 42 attributes
■ Duration: length (number of seconds) of the connection
■ Count: number of connections to the same host in the past two seconds
● An Intrusion Detection System should not wait until a connection completes
Bontemps’ Solution
● Look for anomalus sequences in stream of packets
● Train a machine learner using legitimate traffic
○ Anomalies are defined based on prediction error
● Bontemps et al. used Long Short-Term Memory (LSTM) model [4]
○ Trained LSTM Recurrent Neural Network (RNN) using normal traffic from Darpa 1999
○ 100 % True Positives with 63 False Positives
○ Neptune DOS only
Sequence To Sequence (Seq2Seq) Model
● An encoder-decoder model developed by Luong et. al using LSTM [2]
Image Credits: https://www.tensorflow.org/tutorials/seq2seq
Seq2Seq Model for Intrusion Detection
● Consider a connection C = {y1, y2, y3, y4… yn}
● Encoder input I1 = {y1, y2, y3}
● Decoder input I2 = {EOC,y4,y5,y6… yn}
● Decoder output: O = {y4
’,y5
’,y6
’… yn
’,EOC’}
● Prediction error: E = Diff(O, {y4,y5,y6… yn,EOC})
● Attack: IF E > Threshold
Seq2Seq ModelI1
I2
O
Seq2Seq Model for Intrusion Detection
● Neural Machine Translation (NMT)
○ Sequence: A sentence (Meaningfully ordered words)
○ Element: A word (1 dimension)
○ Encoding: One-hot encoding - Ideally, vector size is equivalent to number of words in the language
● Intrusion Detection
○ Sequence: A connection (Meaningfully ordered packets)
○ Element: A network packet (multi-dimension)
○ Encoding: One-hot
Methodology
● Built a multi-attribute seq2seq model for intrusion detection
● Trained the model using attack-free TCP traffic from Darpa 1999 dataset [3]
○ Packets were split into connections
○ Connections with less than 4 packets were ignored
○ Connections with more than 60 packets were pruned to 60 - 96.96% connections had less than 60
○ Connections with packets between 4 - 59 were padded with empty packets
○ Selected attributes were encoded into one-hot vector
Test A - Batch Processing
● Dataset: DARPA 1999 pcaps → Packets between same source and destination
● Model determines the end of connection
○ Decoder reached EOC
○ Reached Ⲧ number of packets (100 in our case)
● Hypothesis
○ Model reached the limit Ⲧ → Sequence has no connection or connection has more than Ⲧ packets
○ High accuracy → Packets follow the standard flow
○ Ⲧ packets and Low accuracy → Anomaly
Test A - Batch Processing
Cluster Accuracy Packets
1 95.19 97.08
2 61.80 9.52
3 76.52 7.68
4 89.16 13.06
5 76.66 96.49
6 12.25 94.47
Test B - Real-time Processing
● Dataset: DARPA 1999 pcaps → Packets between same source and destination
● System raise an alarm if the average accuracy of predicted packets is < 12.25%
● Result:
○ Attacks: Neptune and Port Scan
○ Anomalous packets: 97.02% detection ratio and 0.07% False Alarms
○ Attack detection: 100% true positives with 1 false alarm
■ LSTM RNN by Botemps gives 100% TP and 63 FP for Neptune attack in Darpa 1999 [4]
Attack detection:100% TP & Anomalous packet detection: 90% TP
Conclusion
● Multi-attribute Seq2Seq model for real-time intrusion detection
● Select “Ⲧ” based on average number of packets per connection in your network
● Progress:
○ Trained UDP packets
○ Built an Intrusion Detection System (IDS) using the proposed model
References
1. University of California, “KDD Cup 1999 Data,” may 2018. [Online]. Available:
http://kdd.ics.uci.edu/databases/kddcup99/kddcup99.html
2. M.-T. Luong, H. Pham, and C. D. Manning, “Effective approaches to attention-based neural machine
translation,” in Empirical Methods in Natural Language Processing (EMNLP). Association for
Computational Linguistics, 2015, pp. 1412–1421. [Online]. Available: http://aclweb.org/anthology/D15-
1166
3. R. Lippmann, J. W. Haines, D. J. Fried, J. Korba, and K. Das, “The 1999 darpa off-line intrusion detection
evaluation,” Comput. Netw., vol. 34, no. 4, pp. 579–595, 2000. [Online].
Available:http://dx.doi.org/10.1016/S1389-1286(00)00139-0
4. L. Bontemps, V. L. Cao, J. McDermott, and N. Le-Khac, “Collective anomaly detection based on long short
term memory recurrent neural network,” 2017. [Online]. Available: http://arxiv.org/abs/1703.09752
Acknowledgement
● We gratefully acknowledge financial supporters
○ Western Engineering
○ National Science and Engineering Research Council (NS, Canada
Thank You
Any Questions?

More Related Content

What's hot

CNIT 1417. Keyed Hashing
CNIT 1417. Keyed HashingCNIT 1417. Keyed Hashing
CNIT 1417. Keyed HashingSam Bowne
 
A NEW APPROACH TOWARDS INFORMATION SECURITY BASED ON DNA CRYPTOGRAPHY
A NEW APPROACH TOWARDS INFORMATION SECURITY BASED ON  DNA CRYPTOGRAPHY A NEW APPROACH TOWARDS INFORMATION SECURITY BASED ON  DNA CRYPTOGRAPHY
A NEW APPROACH TOWARDS INFORMATION SECURITY BASED ON DNA CRYPTOGRAPHY Abhishek Majumdar
 
Net Security Basic
Net Security BasicNet Security Basic
Net Security Basicphanleson
 
Error detection methods-computer networks
Error detection methods-computer networksError detection methods-computer networks
Error detection methods-computer networksDHIVYADEVAKI
 
CNIT 141 6. Hash Functions
CNIT 141 6. Hash FunctionsCNIT 141 6. Hash Functions
CNIT 141 6. Hash FunctionsSam Bowne
 
Client server computing in mobile environments part 2
Client server computing in mobile environments part 2Client server computing in mobile environments part 2
Client server computing in mobile environments part 2Praveen Joshi
 
Message authentication and hash function
Message authentication and hash functionMessage authentication and hash function
Message authentication and hash functionomarShiekh1
 
Block Ciphers Modes of Operation
Block Ciphers Modes of OperationBlock Ciphers Modes of Operation
Block Ciphers Modes of OperationRoman Oliynykov
 
ACSAC2016: Code Obfuscation Against Symbolic Execution Attacks
ACSAC2016: Code Obfuscation Against Symbolic Execution AttacksACSAC2016: Code Obfuscation Against Symbolic Execution Attacks
ACSAC2016: Code Obfuscation Against Symbolic Execution AttacksSebastian Banescu
 
CNIT 141: 4. Block Ciphers
CNIT 141: 4. Block CiphersCNIT 141: 4. Block Ciphers
CNIT 141: 4. Block CiphersSam Bowne
 
A new DNA encryption technique for secure data transmission with authenticati...
A new DNA encryption technique for secure data transmission with authenticati...A new DNA encryption technique for secure data transmission with authenticati...
A new DNA encryption technique for secure data transmission with authenticati...Sajedul Karim
 
Next generation block ciphers
Next generation block ciphersNext generation block ciphers
Next generation block ciphersRoman Oliynykov
 
IRJET- DNA Cryptography
IRJET-  	  DNA CryptographyIRJET-  	  DNA Cryptography
IRJET- DNA CryptographyIRJET Journal
 

What's hot (20)

Acm aictc2016
Acm aictc2016Acm aictc2016
Acm aictc2016
 
CNIT 1417. Keyed Hashing
CNIT 1417. Keyed HashingCNIT 1417. Keyed Hashing
CNIT 1417. Keyed Hashing
 
Chapter 3
Chapter 3Chapter 3
Chapter 3
 
A NEW APPROACH TOWARDS INFORMATION SECURITY BASED ON DNA CRYPTOGRAPHY
A NEW APPROACH TOWARDS INFORMATION SECURITY BASED ON  DNA CRYPTOGRAPHY A NEW APPROACH TOWARDS INFORMATION SECURITY BASED ON  DNA CRYPTOGRAPHY
A NEW APPROACH TOWARDS INFORMATION SECURITY BASED ON DNA CRYPTOGRAPHY
 
Net Security Basic
Net Security BasicNet Security Basic
Net Security Basic
 
Error detection methods-computer networks
Error detection methods-computer networksError detection methods-computer networks
Error detection methods-computer networks
 
CNIT 141 6. Hash Functions
CNIT 141 6. Hash FunctionsCNIT 141 6. Hash Functions
CNIT 141 6. Hash Functions
 
Client server computing in mobile environments part 2
Client server computing in mobile environments part 2Client server computing in mobile environments part 2
Client server computing in mobile environments part 2
 
Outsourced database
Outsourced databaseOutsourced database
Outsourced database
 
Pres_FORENSECURE
Pres_FORENSECUREPres_FORENSECURE
Pres_FORENSECURE
 
Message authentication and hash function
Message authentication and hash functionMessage authentication and hash function
Message authentication and hash function
 
Block Ciphers Modes of Operation
Block Ciphers Modes of OperationBlock Ciphers Modes of Operation
Block Ciphers Modes of Operation
 
ACSAC2016: Code Obfuscation Against Symbolic Execution Attacks
ACSAC2016: Code Obfuscation Against Symbolic Execution AttacksACSAC2016: Code Obfuscation Against Symbolic Execution Attacks
ACSAC2016: Code Obfuscation Against Symbolic Execution Attacks
 
CNIT 141: 4. Block Ciphers
CNIT 141: 4. Block CiphersCNIT 141: 4. Block Ciphers
CNIT 141: 4. Block Ciphers
 
A new DNA encryption technique for secure data transmission with authenticati...
A new DNA encryption technique for secure data transmission with authenticati...A new DNA encryption technique for secure data transmission with authenticati...
A new DNA encryption technique for secure data transmission with authenticati...
 
Next generation block ciphers
Next generation block ciphersNext generation block ciphers
Next generation block ciphers
 
RSA
RSARSA
RSA
 
I1086066
I1086066I1086066
I1086066
 
Hash
HashHash
Hash
 
IRJET- DNA Cryptography
IRJET-  	  DNA CryptographyIRJET-  	  DNA Cryptography
IRJET- DNA Cryptography
 

Similar to Sequence to Sequence Pattern Learning Algorithm for Real-time Anomaly Detection in Network Traffic

Real time intrusion detection in network traffic using adaptive and auto-scal...
Real time intrusion detection in network traffic using adaptive and auto-scal...Real time intrusion detection in network traffic using adaptive and auto-scal...
Real time intrusion detection in network traffic using adaptive and auto-scal...Gobinath Loganathan
 
Network Intrusion Detection Dean Final, actual version
Network Intrusion Detection Dean Final, actual versionNetwork Intrusion Detection Dean Final, actual version
Network Intrusion Detection Dean Final, actual versionTianye Song
 
Error control coding techniques
Error control coding techniquesError control coding techniques
Error control coding techniquesDhanashriNandre
 
A machine learning based protocol for efficient routing in opportunistic netw...
A machine learning based protocol for efficient routing in opportunistic netw...A machine learning based protocol for efficient routing in opportunistic netw...
A machine learning based protocol for efficient routing in opportunistic netw...Fellowship at Vodafone FutureLab
 
Anomaly Detection through Reinforcement Learning
Anomaly Detection through Reinforcement LearningAnomaly Detection through Reinforcement Learning
Anomaly Detection through Reinforcement LearningHari Koduvely (PhD)
 
Bluetooth Low Energy - A Case Study
Bluetooth Low Energy - A Case StudyBluetooth Low Energy - A Case Study
Bluetooth Low Energy - A Case StudyFReeze FRancis
 
Black-box Behavioral Model Inference for Autopilot Software Systems
Black-box Behavioral Model Inference for Autopilot Software SystemsBlack-box Behavioral Model Inference for Autopilot Software Systems
Black-box Behavioral Model Inference for Autopilot Software SystemsMohammad Jafar Mashhadi
 
240219_RNN, LSTM code.pptxdddddddddddddddd
240219_RNN, LSTM code.pptxdddddddddddddddd240219_RNN, LSTM code.pptxdddddddddddddddd
240219_RNN, LSTM code.pptxddddddddddddddddssuser2624f71
 
Icacci presentation-cnn intrusion
Icacci presentation-cnn intrusionIcacci presentation-cnn intrusion
Icacci presentation-cnn intrusionvinaykumar R
 
Network Intrusion Detection (1)-converted-1.pptx
Network Intrusion Detection (1)-converted-1.pptxNetwork Intrusion Detection (1)-converted-1.pptx
Network Intrusion Detection (1)-converted-1.pptxSubhrajyotiPayra
 
[JPDC,JCC@LMN22] Ad hoc systems Management and specification with distributed...
[JPDC,JCC@LMN22] Ad hoc systems Management and specification with distributed...[JPDC,JCC@LMN22] Ad hoc systems Management and specification with distributed...
[JPDC,JCC@LMN22] Ad hoc systems Management and specification with distributed...Universidad de los Andes
 
Automatic DNA Sequence Generation for Secured Effective Multi -Cloud Storage
Automatic DNA Sequence Generation for Secured Effective Multi -Cloud StorageAutomatic DNA Sequence Generation for Secured Effective Multi -Cloud Storage
Automatic DNA Sequence Generation for Secured Effective Multi -Cloud StorageIOSR Journals
 
[20240304_LabSeminar_Huy]DeepWalk: Online Learning of Social Representations....
[20240304_LabSeminar_Huy]DeepWalk: Online Learning of Social Representations....[20240304_LabSeminar_Huy]DeepWalk: Online Learning of Social Representations....
[20240304_LabSeminar_Huy]DeepWalk: Online Learning of Social Representations....thanhdowork
 
Intrusion Detection in A Smart Forest-Fire Early Warning Sensory System
 Intrusion Detection in A Smart Forest-Fire Early Warning Sensory System Intrusion Detection in A Smart Forest-Fire Early Warning Sensory System
Intrusion Detection in A Smart Forest-Fire Early Warning Sensory SystemRatul Alahy
 
Labmeeting - 20150512 - New Secure Routing Method & Applications Facing MitM ...
Labmeeting - 20150512 - New Secure Routing Method & Applications Facing MitM ...Labmeeting - 20150512 - New Secure Routing Method & Applications Facing MitM ...
Labmeeting - 20150512 - New Secure Routing Method & Applications Facing MitM ...Syuan Wang
 
Network Anomaly detection based on fuzzy logic and Genetic Algorithm
Network Anomaly detection based on fuzzy logic and Genetic AlgorithmNetwork Anomaly detection based on fuzzy logic and Genetic Algorithm
Network Anomaly detection based on fuzzy logic and Genetic AlgorithmYatindra shashi
 

Similar to Sequence to Sequence Pattern Learning Algorithm for Real-time Anomaly Detection in Network Traffic (20)

Artificial neural networks
Artificial neural networks Artificial neural networks
Artificial neural networks
 
Real time intrusion detection in network traffic using adaptive and auto-scal...
Real time intrusion detection in network traffic using adaptive and auto-scal...Real time intrusion detection in network traffic using adaptive and auto-scal...
Real time intrusion detection in network traffic using adaptive and auto-scal...
 
Network Intrusion Detection Dean Final, actual version
Network Intrusion Detection Dean Final, actual versionNetwork Intrusion Detection Dean Final, actual version
Network Intrusion Detection Dean Final, actual version
 
IDS for IoT.pptx
IDS for IoT.pptxIDS for IoT.pptx
IDS for IoT.pptx
 
Error control coding techniques
Error control coding techniquesError control coding techniques
Error control coding techniques
 
A machine learning based protocol for efficient routing in opportunistic netw...
A machine learning based protocol for efficient routing in opportunistic netw...A machine learning based protocol for efficient routing in opportunistic netw...
A machine learning based protocol for efficient routing in opportunistic netw...
 
Anomaly Detection through Reinforcement Learning
Anomaly Detection through Reinforcement LearningAnomaly Detection through Reinforcement Learning
Anomaly Detection through Reinforcement Learning
 
Bluetooth Low Energy - A Case Study
Bluetooth Low Energy - A Case StudyBluetooth Low Energy - A Case Study
Bluetooth Low Energy - A Case Study
 
Black-box Behavioral Model Inference for Autopilot Software Systems
Black-box Behavioral Model Inference for Autopilot Software SystemsBlack-box Behavioral Model Inference for Autopilot Software Systems
Black-box Behavioral Model Inference for Autopilot Software Systems
 
240219_RNN, LSTM code.pptxdddddddddddddddd
240219_RNN, LSTM code.pptxdddddddddddddddd240219_RNN, LSTM code.pptxdddddddddddddddd
240219_RNN, LSTM code.pptxdddddddddddddddd
 
Icacci presentation-cnn intrusion
Icacci presentation-cnn intrusionIcacci presentation-cnn intrusion
Icacci presentation-cnn intrusion
 
Network Intrusion Detection (1)-converted-1.pptx
Network Intrusion Detection (1)-converted-1.pptxNetwork Intrusion Detection (1)-converted-1.pptx
Network Intrusion Detection (1)-converted-1.pptx
 
[JPDC,JCC@LMN22] Ad hoc systems Management and specification with distributed...
[JPDC,JCC@LMN22] Ad hoc systems Management and specification with distributed...[JPDC,JCC@LMN22] Ad hoc systems Management and specification with distributed...
[JPDC,JCC@LMN22] Ad hoc systems Management and specification with distributed...
 
Automatic DNA Sequence Generation for Secured Effective Multi -Cloud Storage
Automatic DNA Sequence Generation for Secured Effective Multi -Cloud StorageAutomatic DNA Sequence Generation for Secured Effective Multi -Cloud Storage
Automatic DNA Sequence Generation for Secured Effective Multi -Cloud Storage
 
[20240304_LabSeminar_Huy]DeepWalk: Online Learning of Social Representations....
[20240304_LabSeminar_Huy]DeepWalk: Online Learning of Social Representations....[20240304_LabSeminar_Huy]DeepWalk: Online Learning of Social Representations....
[20240304_LabSeminar_Huy]DeepWalk: Online Learning of Social Representations....
 
Intrusion Detection in A Smart Forest-Fire Early Warning Sensory System
 Intrusion Detection in A Smart Forest-Fire Early Warning Sensory System Intrusion Detection in A Smart Forest-Fire Early Warning Sensory System
Intrusion Detection in A Smart Forest-Fire Early Warning Sensory System
 
Labmeeting - 20150512 - New Secure Routing Method & Applications Facing MitM ...
Labmeeting - 20150512 - New Secure Routing Method & Applications Facing MitM ...Labmeeting - 20150512 - New Secure Routing Method & Applications Facing MitM ...
Labmeeting - 20150512 - New Secure Routing Method & Applications Facing MitM ...
 
Cs8591 Computer Networks
Cs8591 Computer NetworksCs8591 Computer Networks
Cs8591 Computer Networks
 
Machine Learning
Machine LearningMachine Learning
Machine Learning
 
Network Anomaly detection based on fuzzy logic and Genetic Algorithm
Network Anomaly detection based on fuzzy logic and Genetic AlgorithmNetwork Anomaly detection based on fuzzy logic and Genetic Algorithm
Network Anomaly detection based on fuzzy logic and Genetic Algorithm
 

Recently uploaded

如何办理澳洲拉筹伯大学毕业证(LaTrobe毕业证书)成绩单原件一模一样
如何办理澳洲拉筹伯大学毕业证(LaTrobe毕业证书)成绩单原件一模一样如何办理澳洲拉筹伯大学毕业证(LaTrobe毕业证书)成绩单原件一模一样
如何办理澳洲拉筹伯大学毕业证(LaTrobe毕业证书)成绩单原件一模一样wsppdmt
 
社内勉強会資料_Object Recognition as Next Token Prediction
社内勉強会資料_Object Recognition as Next Token Prediction社内勉強会資料_Object Recognition as Next Token Prediction
社内勉強会資料_Object Recognition as Next Token PredictionNABLAS株式会社
 
Identify Customer Segments to Create Customer Offers for Each Segment - Appli...
Identify Customer Segments to Create Customer Offers for Each Segment - Appli...Identify Customer Segments to Create Customer Offers for Each Segment - Appli...
Identify Customer Segments to Create Customer Offers for Each Segment - Appli...ThinkInnovation
 
Ranking and Scoring Exercises for Research
Ranking and Scoring Exercises for ResearchRanking and Scoring Exercises for Research
Ranking and Scoring Exercises for ResearchRajesh Mondal
 
Simplify hybrid data integration at an enterprise scale. Integrate all your d...
Simplify hybrid data integration at an enterprise scale. Integrate all your d...Simplify hybrid data integration at an enterprise scale. Integrate all your d...
Simplify hybrid data integration at an enterprise scale. Integrate all your d...varanasisatyanvesh
 
Seven tools of quality control.slideshare
Seven tools of quality control.slideshareSeven tools of quality control.slideshare
Seven tools of quality control.slideshareraiaryan448
 
Predictive Precipitation: Advanced Rain Forecasting Techniques
Predictive Precipitation: Advanced Rain Forecasting TechniquesPredictive Precipitation: Advanced Rain Forecasting Techniques
Predictive Precipitation: Advanced Rain Forecasting TechniquesBoston Institute of Analytics
 
Displacement, Velocity, Acceleration, and Second Derivatives
Displacement, Velocity, Acceleration, and Second DerivativesDisplacement, Velocity, Acceleration, and Second Derivatives
Displacement, Velocity, Acceleration, and Second Derivatives23050636
 
Digital Transformation Playbook by Graham Ware
Digital Transformation Playbook by Graham WareDigital Transformation Playbook by Graham Ware
Digital Transformation Playbook by Graham WareGraham Ware
 
Reconciling Conflicting Data Curation Actions: Transparency Through Argument...
Reconciling Conflicting Data Curation Actions:  Transparency Through Argument...Reconciling Conflicting Data Curation Actions:  Transparency Through Argument...
Reconciling Conflicting Data Curation Actions: Transparency Through Argument...Bertram Ludäscher
 
DAA Assignment Solution.pdf is the best1
DAA Assignment Solution.pdf is the best1DAA Assignment Solution.pdf is the best1
DAA Assignment Solution.pdf is the best1sinhaabhiyanshu
 
Case Study 4 Where the cry of rebellion happen?
Case Study 4 Where the cry of rebellion happen?Case Study 4 Where the cry of rebellion happen?
Case Study 4 Where the cry of rebellion happen?RemarkSemacio
 
obat aborsi Bontang wa 082135199655 jual obat aborsi cytotec asli di Bontang
obat aborsi Bontang wa 082135199655 jual obat aborsi cytotec asli di  Bontangobat aborsi Bontang wa 082135199655 jual obat aborsi cytotec asli di  Bontang
obat aborsi Bontang wa 082135199655 jual obat aborsi cytotec asli di Bontangsiskavia95
 
In Riyadh ((+919101817206)) Cytotec kit @ Abortion Pills Saudi Arabia
In Riyadh ((+919101817206)) Cytotec kit @ Abortion Pills Saudi ArabiaIn Riyadh ((+919101817206)) Cytotec kit @ Abortion Pills Saudi Arabia
In Riyadh ((+919101817206)) Cytotec kit @ Abortion Pills Saudi Arabiaahmedjiabur940
 
如何办理(UPenn毕业证书)宾夕法尼亚大学毕业证成绩单本科硕士学位证留信学历认证
如何办理(UPenn毕业证书)宾夕法尼亚大学毕业证成绩单本科硕士学位证留信学历认证如何办理(UPenn毕业证书)宾夕法尼亚大学毕业证成绩单本科硕士学位证留信学历认证
如何办理(UPenn毕业证书)宾夕法尼亚大学毕业证成绩单本科硕士学位证留信学历认证acoha1
 
Abortion Clinic in Kempton Park +27791653574 WhatsApp Abortion Clinic Service...
Abortion Clinic in Kempton Park +27791653574 WhatsApp Abortion Clinic Service...Abortion Clinic in Kempton Park +27791653574 WhatsApp Abortion Clinic Service...
Abortion Clinic in Kempton Park +27791653574 WhatsApp Abortion Clinic Service...mikehavy0
 
SAC 25 Final National, Regional & Local Angel Group Investing Insights 2024 0...
SAC 25 Final National, Regional & Local Angel Group Investing Insights 2024 0...SAC 25 Final National, Regional & Local Angel Group Investing Insights 2024 0...
SAC 25 Final National, Regional & Local Angel Group Investing Insights 2024 0...Elaine Werffeli
 
Jual Obat Aborsi Bandung (Asli No.1) Wa 082134680322 Klinik Obat Penggugur Ka...
Jual Obat Aborsi Bandung (Asli No.1) Wa 082134680322 Klinik Obat Penggugur Ka...Jual Obat Aborsi Bandung (Asli No.1) Wa 082134680322 Klinik Obat Penggugur Ka...
Jual Obat Aborsi Bandung (Asli No.1) Wa 082134680322 Klinik Obat Penggugur Ka...Klinik Aborsi
 
Jual obat aborsi Bandung ( 085657271886 ) Cytote pil telat bulan penggugur ka...
Jual obat aborsi Bandung ( 085657271886 ) Cytote pil telat bulan penggugur ka...Jual obat aborsi Bandung ( 085657271886 ) Cytote pil telat bulan penggugur ka...
Jual obat aborsi Bandung ( 085657271886 ) Cytote pil telat bulan penggugur ka...Klinik kandungan
 
obat aborsi Tarakan wa 081336238223 jual obat aborsi cytotec asli di Tarakan9...
obat aborsi Tarakan wa 081336238223 jual obat aborsi cytotec asli di Tarakan9...obat aborsi Tarakan wa 081336238223 jual obat aborsi cytotec asli di Tarakan9...
obat aborsi Tarakan wa 081336238223 jual obat aborsi cytotec asli di Tarakan9...yulianti213969
 

Recently uploaded (20)

如何办理澳洲拉筹伯大学毕业证(LaTrobe毕业证书)成绩单原件一模一样
如何办理澳洲拉筹伯大学毕业证(LaTrobe毕业证书)成绩单原件一模一样如何办理澳洲拉筹伯大学毕业证(LaTrobe毕业证书)成绩单原件一模一样
如何办理澳洲拉筹伯大学毕业证(LaTrobe毕业证书)成绩单原件一模一样
 
社内勉強会資料_Object Recognition as Next Token Prediction
社内勉強会資料_Object Recognition as Next Token Prediction社内勉強会資料_Object Recognition as Next Token Prediction
社内勉強会資料_Object Recognition as Next Token Prediction
 
Identify Customer Segments to Create Customer Offers for Each Segment - Appli...
Identify Customer Segments to Create Customer Offers for Each Segment - Appli...Identify Customer Segments to Create Customer Offers for Each Segment - Appli...
Identify Customer Segments to Create Customer Offers for Each Segment - Appli...
 
Ranking and Scoring Exercises for Research
Ranking and Scoring Exercises for ResearchRanking and Scoring Exercises for Research
Ranking and Scoring Exercises for Research
 
Simplify hybrid data integration at an enterprise scale. Integrate all your d...
Simplify hybrid data integration at an enterprise scale. Integrate all your d...Simplify hybrid data integration at an enterprise scale. Integrate all your d...
Simplify hybrid data integration at an enterprise scale. Integrate all your d...
 
Seven tools of quality control.slideshare
Seven tools of quality control.slideshareSeven tools of quality control.slideshare
Seven tools of quality control.slideshare
 
Predictive Precipitation: Advanced Rain Forecasting Techniques
Predictive Precipitation: Advanced Rain Forecasting TechniquesPredictive Precipitation: Advanced Rain Forecasting Techniques
Predictive Precipitation: Advanced Rain Forecasting Techniques
 
Displacement, Velocity, Acceleration, and Second Derivatives
Displacement, Velocity, Acceleration, and Second DerivativesDisplacement, Velocity, Acceleration, and Second Derivatives
Displacement, Velocity, Acceleration, and Second Derivatives
 
Digital Transformation Playbook by Graham Ware
Digital Transformation Playbook by Graham WareDigital Transformation Playbook by Graham Ware
Digital Transformation Playbook by Graham Ware
 
Reconciling Conflicting Data Curation Actions: Transparency Through Argument...
Reconciling Conflicting Data Curation Actions:  Transparency Through Argument...Reconciling Conflicting Data Curation Actions:  Transparency Through Argument...
Reconciling Conflicting Data Curation Actions: Transparency Through Argument...
 
DAA Assignment Solution.pdf is the best1
DAA Assignment Solution.pdf is the best1DAA Assignment Solution.pdf is the best1
DAA Assignment Solution.pdf is the best1
 
Case Study 4 Where the cry of rebellion happen?
Case Study 4 Where the cry of rebellion happen?Case Study 4 Where the cry of rebellion happen?
Case Study 4 Where the cry of rebellion happen?
 
obat aborsi Bontang wa 082135199655 jual obat aborsi cytotec asli di Bontang
obat aborsi Bontang wa 082135199655 jual obat aborsi cytotec asli di  Bontangobat aborsi Bontang wa 082135199655 jual obat aborsi cytotec asli di  Bontang
obat aborsi Bontang wa 082135199655 jual obat aborsi cytotec asli di Bontang
 
In Riyadh ((+919101817206)) Cytotec kit @ Abortion Pills Saudi Arabia
In Riyadh ((+919101817206)) Cytotec kit @ Abortion Pills Saudi ArabiaIn Riyadh ((+919101817206)) Cytotec kit @ Abortion Pills Saudi Arabia
In Riyadh ((+919101817206)) Cytotec kit @ Abortion Pills Saudi Arabia
 
如何办理(UPenn毕业证书)宾夕法尼亚大学毕业证成绩单本科硕士学位证留信学历认证
如何办理(UPenn毕业证书)宾夕法尼亚大学毕业证成绩单本科硕士学位证留信学历认证如何办理(UPenn毕业证书)宾夕法尼亚大学毕业证成绩单本科硕士学位证留信学历认证
如何办理(UPenn毕业证书)宾夕法尼亚大学毕业证成绩单本科硕士学位证留信学历认证
 
Abortion Clinic in Kempton Park +27791653574 WhatsApp Abortion Clinic Service...
Abortion Clinic in Kempton Park +27791653574 WhatsApp Abortion Clinic Service...Abortion Clinic in Kempton Park +27791653574 WhatsApp Abortion Clinic Service...
Abortion Clinic in Kempton Park +27791653574 WhatsApp Abortion Clinic Service...
 
SAC 25 Final National, Regional & Local Angel Group Investing Insights 2024 0...
SAC 25 Final National, Regional & Local Angel Group Investing Insights 2024 0...SAC 25 Final National, Regional & Local Angel Group Investing Insights 2024 0...
SAC 25 Final National, Regional & Local Angel Group Investing Insights 2024 0...
 
Jual Obat Aborsi Bandung (Asli No.1) Wa 082134680322 Klinik Obat Penggugur Ka...
Jual Obat Aborsi Bandung (Asli No.1) Wa 082134680322 Klinik Obat Penggugur Ka...Jual Obat Aborsi Bandung (Asli No.1) Wa 082134680322 Klinik Obat Penggugur Ka...
Jual Obat Aborsi Bandung (Asli No.1) Wa 082134680322 Klinik Obat Penggugur Ka...
 
Jual obat aborsi Bandung ( 085657271886 ) Cytote pil telat bulan penggugur ka...
Jual obat aborsi Bandung ( 085657271886 ) Cytote pil telat bulan penggugur ka...Jual obat aborsi Bandung ( 085657271886 ) Cytote pil telat bulan penggugur ka...
Jual obat aborsi Bandung ( 085657271886 ) Cytote pil telat bulan penggugur ka...
 
obat aborsi Tarakan wa 081336238223 jual obat aborsi cytotec asli di Tarakan9...
obat aborsi Tarakan wa 081336238223 jual obat aborsi cytotec asli di Tarakan9...obat aborsi Tarakan wa 081336238223 jual obat aborsi cytotec asli di Tarakan9...
obat aborsi Tarakan wa 081336238223 jual obat aborsi cytotec asli di Tarakan9...
 

Sequence to Sequence Pattern Learning Algorithm for Real-time Anomaly Detection in Network Traffic

  • 1. Sequence to Sequence Pattern Learning Algorithm for Real-time Anomaly Detection in Network Traffic Gobinath Loganathan∗ , Jagath Samarabandu† and Xianbin Wang‡ Department of Electrical and Computer Engineering The University of Western Ontario London, Ontario, N6A 5B9, Canada ∗ lgobinat@uwo.ca, † jagath@uwo.ca, ‡ xianbin.wang@uwo.ca
  • 2. Outline 1. Introduction 2. Related Work 3. Methodology 4. Tests & Results 5. Conclusion
  • 3. Introduction ● Network Intrusion - Intentional violation of expected behavior or protocol rule ● A network rule can be defined as a sequence of packets ● Network Intrusion → Anomalous sequential order of packets Image Credits: https://www.cisco.com/c/en/us/about/press/internet-protocol-journal/back-issues/table-contents-34/syn-flooding-attacks.html
  • 4. Problem ● Flattened datasets do not capture the sequential relationship ○ KDD 1999 [1] contains 42 attributes ■ Duration: length (number of seconds) of the connection ■ Count: number of connections to the same host in the past two seconds ● An Intrusion Detection System should not wait until a connection completes
  • 5. Bontemps’ Solution ● Look for anomalus sequences in stream of packets ● Train a machine learner using legitimate traffic ○ Anomalies are defined based on prediction error ● Bontemps et al. used Long Short-Term Memory (LSTM) model [4] ○ Trained LSTM Recurrent Neural Network (RNN) using normal traffic from Darpa 1999 ○ 100 % True Positives with 63 False Positives ○ Neptune DOS only
  • 6. Sequence To Sequence (Seq2Seq) Model ● An encoder-decoder model developed by Luong et. al using LSTM [2] Image Credits: https://www.tensorflow.org/tutorials/seq2seq
  • 7. Seq2Seq Model for Intrusion Detection ● Consider a connection C = {y1, y2, y3, y4… yn} ● Encoder input I1 = {y1, y2, y3} ● Decoder input I2 = {EOC,y4,y5,y6… yn} ● Decoder output: O = {y4 ’,y5 ’,y6 ’… yn ’,EOC’} ● Prediction error: E = Diff(O, {y4,y5,y6… yn,EOC}) ● Attack: IF E > Threshold Seq2Seq ModelI1 I2 O
  • 8. Seq2Seq Model for Intrusion Detection ● Neural Machine Translation (NMT) ○ Sequence: A sentence (Meaningfully ordered words) ○ Element: A word (1 dimension) ○ Encoding: One-hot encoding - Ideally, vector size is equivalent to number of words in the language ● Intrusion Detection ○ Sequence: A connection (Meaningfully ordered packets) ○ Element: A network packet (multi-dimension) ○ Encoding: One-hot
  • 9. Methodology ● Built a multi-attribute seq2seq model for intrusion detection ● Trained the model using attack-free TCP traffic from Darpa 1999 dataset [3] ○ Packets were split into connections ○ Connections with less than 4 packets were ignored ○ Connections with more than 60 packets were pruned to 60 - 96.96% connections had less than 60 ○ Connections with packets between 4 - 59 were padded with empty packets ○ Selected attributes were encoded into one-hot vector
  • 10. Test A - Batch Processing ● Dataset: DARPA 1999 pcaps → Packets between same source and destination ● Model determines the end of connection ○ Decoder reached EOC ○ Reached Ⲧ number of packets (100 in our case) ● Hypothesis ○ Model reached the limit Ⲧ → Sequence has no connection or connection has more than Ⲧ packets ○ High accuracy → Packets follow the standard flow ○ Ⲧ packets and Low accuracy → Anomaly
  • 11. Test A - Batch Processing Cluster Accuracy Packets 1 95.19 97.08 2 61.80 9.52 3 76.52 7.68 4 89.16 13.06 5 76.66 96.49 6 12.25 94.47
  • 12. Test B - Real-time Processing ● Dataset: DARPA 1999 pcaps → Packets between same source and destination ● System raise an alarm if the average accuracy of predicted packets is < 12.25% ● Result: ○ Attacks: Neptune and Port Scan ○ Anomalous packets: 97.02% detection ratio and 0.07% False Alarms ○ Attack detection: 100% true positives with 1 false alarm ■ LSTM RNN by Botemps gives 100% TP and 63 FP for Neptune attack in Darpa 1999 [4] Attack detection:100% TP & Anomalous packet detection: 90% TP
  • 13. Conclusion ● Multi-attribute Seq2Seq model for real-time intrusion detection ● Select “Ⲧ” based on average number of packets per connection in your network ● Progress: ○ Trained UDP packets ○ Built an Intrusion Detection System (IDS) using the proposed model
  • 14. References 1. University of California, “KDD Cup 1999 Data,” may 2018. [Online]. Available: http://kdd.ics.uci.edu/databases/kddcup99/kddcup99.html 2. M.-T. Luong, H. Pham, and C. D. Manning, “Effective approaches to attention-based neural machine translation,” in Empirical Methods in Natural Language Processing (EMNLP). Association for Computational Linguistics, 2015, pp. 1412–1421. [Online]. Available: http://aclweb.org/anthology/D15- 1166 3. R. Lippmann, J. W. Haines, D. J. Fried, J. Korba, and K. Das, “The 1999 darpa off-line intrusion detection evaluation,” Comput. Netw., vol. 34, no. 4, pp. 579–595, 2000. [Online]. Available:http://dx.doi.org/10.1016/S1389-1286(00)00139-0 4. L. Bontemps, V. L. Cao, J. McDermott, and N. Le-Khac, “Collective anomaly detection based on long short term memory recurrent neural network,” 2017. [Online]. Available: http://arxiv.org/abs/1703.09752
  • 15. Acknowledgement ● We gratefully acknowledge financial supporters ○ Western Engineering ○ National Science and Engineering Research Council (NS, Canada