skip to main content
10.1145/3385003.3410924acmconferencesArticle/Chapter ViewAbstractPublication Pagesasia-ccsConference Proceedingsconference-collections
research-article

An Empirical Study on Unsupervised Network Anomaly Detection using Generative Adversarial Networks

Authors Info & Claims
Published:07 October 2020Publication History

ABSTRACT

Network anomalies can arise due to various causes such as abnormal behaviors from users, malfunctioning network devices, malicious activities performed by attackers, malicious software or botnets. With the emergence of machine learning and especially deep learning, many works in the literature developed learning models that are able to detect network anomalies. However, these models require massive amounts of labeled data for model training and may not be able to detect unknown anomalous traffic or zero-day attacks. Unsupervised learning techniques such as autoencoder and its variants do not require labeled data but their performance is still poor. Generative adversarial networks (GANs) have successfully demonstrated their capability of implicitly learning data distributions of arbitrarily complex dimensions. This motivates us to carry out an empirical study on the capability of GANs in network anomaly detection. We adopt two existing GAN models and develop new neural networks for their components, i.e., generator and discriminator. We carry out extensive experiments to evaluate the performance of GANs and compare with existing unsupervised detection techniques. We use multiple datasets that include both realistic traffic captures (PCAP) and synthetic traffic generated by simulation platforms. We develop a traffic aggregation technique to extract statistical features that are useful for the models to learn traffic behaviors. The experimental results show that GANs outperform the existing techniques with a significant improvement in different performance metrics.

References

  1. Martin Arjovsky and Léon Bottou. 2017. Towards Principled Methods for Training Generative Adversarial Networks. In Proc. ICLR 2017. Toulon, France.Google ScholarGoogle Scholar
  2. L. Bilge et al. 2012. Disclosure: Detecting Botnet Command and Control Servers Through Large-scale NetFlow Analysis. In Proc. ACSAC'12. Orlando, USA.Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. B. Claise et al. 2013. Specification of the IP Flow Information Export (IPFIX) Protocol for the Exchange of Flow Information. Technical Report RFC 7011. Cisco Systems.Google ScholarGoogle Scholar
  4. A. Creswell et al. 2018. Generative Adversarial Networks: An Overview. IEEE Signal Processing Magazine, Vol. 35, 1 (Jan. 2018), 53--65.Google ScholarGoogle ScholarCross RefCross Ref
  5. N. Duffield et al. 2009. Rule-Based Anomaly Detection on IP Flows. In IEEE INFOCOM 2009. Rio de Janeiro, Brazil, 424--432.Google ScholarGoogle Scholar
  6. Vincent Dumoulin et al. 2017. Adversarially Learned Inference. In Proc. ICLR 2017. Toulon, France.Google ScholarGoogle Scholar
  7. Ian Goodfellow et al. 2014. Generative Adversarial Nets. In Proc. NIPS 2014. Montréal, Canada.Google ScholarGoogle Scholar
  8. G. Kathareios et al. 2017. Catch It If You Can: Real-Time Network Anomaly Detection with Low False Alarm Rates. In Proc. 16th IEEE International Conference on Machine Learning and Applications. Cancun, Mexico, 924--929.Google ScholarGoogle ScholarCross RefCross Ref
  9. Tae-Young Kim and Sung-Bae Cho. 2018. Web traffic anomaly detection using C-LSTM neural networks. Expert Systems with Applications, Vol. 106 (Sept. 2018).Google ScholarGoogle Scholar
  10. D. Kwon et al. 2018. An Empirical Study on Network Anomaly Detection Using Convolutional Neural Networks. In Proc. IEEE CDCS 2018. Vienna, Austria.Google ScholarGoogle ScholarCross RefCross Ref
  11. Anukool Lakhina et al. 2004. Characterization of Network-wide Anomalies in Traffic Flows. In Proc. ACM SIGCOMM IMC'04. Taormina, Sicily, Italy, 201--206.Google ScholarGoogle Scholar
  12. Hung-yi Lee and Yu Tsao. 2018. Generative Adversarial Network and its Applications to Speech Signal and Natural Language Processing. http://sigport.org/2863Google ScholarGoogle Scholar
  13. Chunyuan Li et al. 2017. ALICE: Towards Understanding Adversarial Learning for Joint Distribution Matching. In Proc. NIPS 2017. Long Beach, USA.Google ScholarGoogle Scholar
  14. Takeru Miyato et al. 2018. Spectral Normalization for Generative Adversarial Networks. In Proc. ICLR 2018. Vancouver, Canada.Google ScholarGoogle Scholar
  15. N. Moustafa and J. Slay. 2015. UNSW-NB15: a comprehensive data set for network intrusion detection systems (UNSW-NB15 network data set). In Proc. 2015 Military Communications and Information Systems Conference. Canberra, Australia.Google ScholarGoogle Scholar
  16. S. Naseer et al. 2018. Enhanced Network Anomaly Detection Based on Deep Neural Networks. IEEE Access, Vol. 6 (Aug. 2018), 48231--48246.Google ScholarGoogle ScholarCross RefCross Ref
  17. Q. P. Nguyen et al. 2019. GEE: A Gradient-based Explainable Variational Autoencoder for Network Anomaly Detection. In Proc. IEEE CNS 2019. Washington.Google ScholarGoogle ScholarCross RefCross Ref
  18. Alec Radford et al. 2016. Unsupervised Representation Learning with Deep Convolutional Generative Adversarial Networks. In Proc. International Conference on Learning Representation, Workshop Track. Caribe Hilton, San Juan, Puerto Rico.Google ScholarGoogle Scholar
  19. Thomas Schlegl et al. 2017. Unsupervised Anomaly Detection with Generative Adversarial Networks to Guide Marker Discovery. In Proc. International Conference on Information Processing in Medical Imaging. Boone, USA, 146--157.Google ScholarGoogle Scholar
  20. I. Sharafaldin et al. 2018. Toward Generating a New Intrusion Detection Dataset and Intrusion Traffic Characterization. In Proc. ICISSP 2018. Canberra, Australia.Google ScholarGoogle ScholarCross RefCross Ref
  21. N. Shone et al. 2018. A Deep Learning Approach to Network Intrusion Detection. IEEE Trans. Emerg. Topics Comput. Intell., Vol. 2, 1 (Feb. 2018), 41--50.Google ScholarGoogle ScholarCross RefCross Ref
  22. Fernando Silveira et al. 2010. ASTUTE: Detecting a Different Class of Traffic Anomalies. In Proc. ACM SIGCOMM 2010. New Delhi, India, 267--278.Google ScholarGoogle Scholar
  23. F. Simmross-Wattenberg et al. 2011. Anomaly Detection in Network Traffic Based on Statistical Inference and α-Stable Modeling. IEEE Trans. Depend. Sec. Comput., Vol. 8, 4 (July 2011), 494--509.Google ScholarGoogle ScholarDigital LibraryDigital Library
  24. R. Sommer et al. 2010. Outside the Closed World: On Using Machine Learning for Network Intrusion Detection. In Proc. IEEE S&P 2010. Oakland, CA, USA.Google ScholarGoogle ScholarDigital LibraryDigital Library
  25. Statista Research Department. 2016. Internet of Things - number of connected devices worldwide 2015--2025. White Paper.Google ScholarGoogle Scholar
  26. Stratosphere. 2015. Stratosphere Laboratory Datasets. https://www.stratosphereips.org/datasets-overview Retrieved March 13, 2020.Google ScholarGoogle Scholar
  27. Mahbod Tavallaee et al. 2009. A Detailed Analysis of the KDD CUP 99 Data Set. In Proc. IEEE CISDA'09. Ottawa, Ontario, Canada, 53--58.Google ScholarGoogle Scholar
  28. L.J.P. van der Maaten and G.E. Hinton. 2008. Visualizing High-Dimensional Data Using t-SNE. Journal of Machine Learning Research, Vol. 9 (Nov. 2008), 2579--2605.Google ScholarGoogle Scholar
  29. J. Wang et al. 2015. Statistical Traffic Anomaly Detection in Time-Varying Communication Networks. IEEE Trans. Control Netw. Syst., Vol. 2, 2 (June 2015).Google ScholarGoogle ScholarCross RefCross Ref
  30. M. Wang et al. 2018. Machine Learning for Networking: Workflow, Advances and Opportunities. IEEE Network, Vol. 32, 2 (Mar. 2018), 92--99.Google ScholarGoogle ScholarCross RefCross Ref
  31. W. Xu et al. 2018. Internet of Vehicles in Big Data Era. IEEE/CAA Journal of Automatica Sinica, Vol. 5, 1 (Jan. 2018), 19--35.Google ScholarGoogle ScholarCross RefCross Ref
  32. Houssam Zenati et al. 2018. Adversarially Learned Anomaly Detection. In Proc. IEEE ICDM 2018. Singapore, 727--736.Google ScholarGoogle Scholar
  33. Shuangfei Zhai et al. 2016. Deep Structured Energy Based Models for Anomaly Detection. In Proc. ICML 2016. New York, NY, USA, 1100--1109.Google ScholarGoogle Scholar
  34. Mingyi Zhu et al. 2018. Network Anomaly Detection and Identification Based on Deep Learning Methods. In CLOUD 2018. Seattle, WA, USA, 219--234.Google ScholarGoogle Scholar
  35. Bo Zong et al. 2018. Deep Autoencoding Gaussian Mixture Model for Unsupervised Anomaly Detection. In Proc. ICLR 2018. Vancouver, BC, Canada.Google ScholarGoogle Scholar

Index Terms

  1. An Empirical Study on Unsupervised Network Anomaly Detection using Generative Adversarial Networks

      Recommendations

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in
      • Published in

        cover image ACM Conferences
        SPAI '20: Proceedings of the 1st ACM Workshop on Security and Privacy on Artificial Intelligence
        October 2020
        60 pages
        ISBN:9781450376112
        DOI:10.1145/3385003

        Copyright © 2020 ACM

        Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        • Published: 7 October 2020

        Permissions

        Request permissions about this article.

        Request Permissions

        Check for updates

        Qualifiers

        • research-article

      PDF Format

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader