dc.contributor.author | Juvonen, Antti | |
dc.contributor.author | Sipola, Tuomo | |
dc.contributor.editor | Koucheryavy, Yevgeni | |
dc.contributor.editor | Rak, Jacek | |
dc.contributor.editor | Sterbenz, James P. G. | |
dc.contributor.editor | Vinel, Alexey | |
dc.contributor.editor | Vishnevsky, Vladimir | |
dc.contributor.editor | Walke, Bernhard H. | |
dc.date.accessioned | 2013-04-12T04:44:47Z | |
dc.date.available | 2013-04-12T04:44:47Z | |
dc.date.issued | 2012 | |
dc.identifier.citation | Juvonen, A., & Sipola, T. (2012). Adaptive framework for network traffic classification using dimensionality reduction and clustering. In Y. Koucheryavy, J. Rak, J. P. G. Sterbenz, A. Vinel, V. Vishnevsky, & B. H. Walke (Eds.), <i>IV International Congress on Ultra Modern Telecommunications and Control Systems 2012</i> (pp. 274-279). IEEE. International Conference on Ultra Modern Telecommunications & workshops. <a href="https://doi.org/10.1109/ICUMT.2012.6459678" target="_blank">https://doi.org/10.1109/ICUMT.2012.6459678</a> | |
dc.identifier.other | CONVID_22184336 | |
dc.identifier.other | TUTKAID_54665 | |
dc.identifier.uri | https://jyx.jyu.fi/handle/123456789/41189 | |
dc.description.abstract | Information security has become a very important topic especially during the last years. Web services are becoming more complex and dynamic. This offers new possibilities for attackers to exploit vulnerabilities by inputting malicious queries or code. However, these attack attempts are often recorded in server logs. Analyzing these logs could be a way to detect intrusions either periodically or in real time. We propose a framework that preprocesses and analyzes these log files. HTTP queries are transformed to numerical matrices using n-gram analysis. The dimensionality of these matrices is reduced using principal component analysis and diffusion map methodology. Abnormal log lines can then be analyzed in more detail. We expand our previous work by elaborating the cluster analysis after obtaining the low-dimensional representation. The framework was tested with actual server log data collected from a large web service. Several previously unknown intrusions were found. Proposed methods could be customized to analyze any kind of log data. The system could be used as a real-time anomaly detection system in any network where sufficient data is available. | fi |
dc.language.iso | eng | |
dc.publisher | IEEE | |
dc.relation.ispartof | IV International Congress on Ultra Modern Telecommunications and Control Systems 2012 | |
dc.relation.ispartofseries | International Conference on Ultra Modern Telecommunications & workshops | |
dc.relation.uri | http://ieeexplore.ieee.org/xpl/articleDetails.jsp?tp=&arnumber=6459678 | |
dc.subject.other | anomaly detection | |
dc.subject.other | diffusion map | |
dc.subject.other | intrusion detection | |
dc.subject.other | k-means | |
dc.subject.other | n-grams | |
dc.title | Adaptive framework for network traffic classification using dimensionality reduction and clustering | |
dc.type | conferenceObject | |
dc.identifier.urn | URN:NBN:fi:jyu-201304121436 | |
dc.contributor.laitos | Tietotekniikan laitos | fi |
dc.contributor.laitos | Department of Mathematical Information Technology | en |
dc.contributor.oppiaine | Tietotekniikka | fi |
dc.contributor.oppiaine | Mathematical Information Technology | en |
jyx.tutka.ksname | IV International Congress on Ultra Modern Telecommunications and Control Systems 2012 | |
dc.type.uri | http://purl.org/eprint/type/ConferencePaper | |
dc.date.updated | 2013-04-12T03:30:04Z | |
dc.relation.isbn | 978-1-4673-2015-3 | |
dc.type.coar | http://purl.org/coar/resource_type/c_5794 | |
dc.description.reviewstatus | peerReviewed | |
dc.format.pagerange | 274-279 | |
dc.relation.issn | 2157-0221 | |
dc.type.version | acceptedVersion | |
dc.rights.copyright | © 2010 IEEE. This is an author's post-print version of an article whose final and definitive form has been published in the conference proceeding by IEEE. | |
dc.rights.accesslevel | openAccess | fi |
dc.relation.conference | International Congress on Ultra Modern Telecommunications and Control Systems | |
dc.subject.yso | tiedonlouhinta | |
dc.subject.yso | koneoppiminen | |
jyx.subject.uri | http://www.yso.fi/onto/yso/p5520 | |
jyx.subject.uri | http://www.yso.fi/onto/yso/p21846 | |
dc.relation.doi | 10.1109/ICUMT.2012.6459678 | |
dc.type.okm | A4 | |