Skip to main navigation Skip to search Skip to main content

A new method of data preprocessing and anomaly detection

  • Jun Zheng*
  • , Ming Zeng Hu
  • , Hong Li Zhang
  • *Corresponding author for this work

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

Data preprocessing including feature extraction is the first significant step in anomaly detection where normal profiles needed to be constructed. The paper defined a sort of traffic flows to be the atomy event unit of preprocessing, making the data preprocessing module more efficient and robust Based on TCP Flows, the paper introduces a novel methodology to analysis the feature attributes of network traffic flow with some new techniques, including a novel quantization model of TCP states. Integrating with data preprocessing, we construct an anomaly detection algorithm with SOFM and applied the detection frame to DARPA Intrusion Detection Evaluation Data. We train SOFM to exploit the normal profile distributions of network traffic. And then the test data with attack-instances embedded is utilized. It is shown that the network attacks are detected with more efficiency and relatively low false alarms.

Original languageEnglish
Title of host publicationProceedings of 2004 International Conference on Machine Learning and Cybernetics
Pages2685-2690
Number of pages6
StatePublished - 2004
EventProceedings of 2004 International Conference on Machine Learning and Cybernetics - Shanghai, China
Duration: 26 Aug 200429 Aug 2004

Publication series

NameProceedings of 2004 International Conference on Machine Learning and Cybernetics
Volume5

Conference

ConferenceProceedings of 2004 International Conference on Machine Learning and Cybernetics
Country/TerritoryChina
CityShanghai
Period26/08/0429/08/04

Keywords

  • Anomaly detection
  • Data preprocessing
  • Self-Organizing Feature Map
  • TCP Flow

Fingerprint

Dive into the research topics of 'A new method of data preprocessing and anomaly detection'. Together they form a unique fingerprint.

Cite this