monitored server. The 8 features were preliminary
processed by the statistical subsystem, and then the
statistical results were classified by the neural archi-
tecture basing on their trend.
For the experimental phase, we used the most com-
plete and available benchmark in Internet: the 1999
DARPA dataset. During the first experiment the sys-
tem was able to quite correctly classify the back-
ground traffic. In fact, considering the only back-
ground traffic, a high rate (92%) of this traffic was
classified in class 1. Also in the second experiment,
considering all the dataset, we obtained encouraging
results. The system was able to autonomously dis-
tinguish the normal traffic from the anomalous one:
it classified the attacks in different classes from that
used for the background traffic. A very important as-
pect is that in some cases the system recognized an
attack classifying all the instances of the attack in the
same class. For example, in the case of three differ-
ent Mailbomb instances, for two UdpStorm instances,
and finally for two of three Smurf instances. Besides,
the system reserved a particular class to classify one
typology of attack. In other words, a class is used
to classify only different instances of the same attack.
This means that our IDS is not only able to distinguish
the normal traffic from the malicious traffic, but it can
establish which attack occurs. Our evaluation is based
on a single source of network traffic due to the lack of
other available data. Obviously, every environment is
different, so we plan to confirm our results using other
sources of real traffic.
REFERENCES
Cabrera, J.B.D., Bavichandran, B., Mehra, R.K., 2000. Sta-
tistical Traffic Modeling for Network Intrusion Detec-
tion. Proceedings of 8th International Symposium on
Modeling, Analysis and Simulation of Computer and
Telecommunication systems:466-473.
DeLooze, L.L., 2006. Attack Characterization and Intru-
sion Detection using an Ensemble of Self-Organizing
Maps. Proceedings of International Joint Conference
on Neural Networks, Vancouver (Canada):2121-2128.
Depren, O., Topallar, M., Anarim, E., Ciliz, M.K., 2005.
An Intelligent Intrusion Detection System (IDS) for
Anomaly and Misuse Detection in Computer Net-
works. Expert System with Applications, 29:713-722.
Ghosh, A.K., Michael, C., Schatz, M., 2000. A Real-Time
Intrusion Detection System Based on Learning Pro-
gram Behavior. Proceedings of the 3rd International
Symposium on Recent Advances in Intrusion Detec-
tion:93-109.
Ghosh, A.K., Wanken, J., Charron, F., 1998. Detection
Anomalous and Unknown Intrusions Against Pro-
grams. Proceedings of IEEE 14th Annual Computer
Security Applications Conference:259-267.
Haines, J.W., Lippmann, R.P., Fried, D.J., Tran, E.,
Boswell, S., Zissman, M.A., 1999. 1999 DARPA In-
trusion Detection System Evaluation: Design and Pro-
cedures. MIT Lincoln Laboratory Technical Report.
Kohonen, T., 2001. Self-Organizing Maps. 3rd edition,
Springer-Verlag, Berlino.
Labib, K., Vemuri, V.R., 2004. Detecting and Visualizing
Denial-of-Service And Network Probe Attacks Using
Principal Component Analysis. SAR’04 the 3rd Con-
ference on Security and Network Architectures.
Lee, W., Stolfo, S.J., Mok, K.,1999. A Data Mining Frame-
work for Building Intrusion Detection Models. Pro-
ceedings of 1999 IEEE Symposium of Security and
Privacy:120-132.
Mahoney, M.V., Chan, P.K., 2003. An Analysis of the
1999 DARPA/Lincoln Laboratory Evaluation Data for
Network Anomaly Detection. Proceeding of Recent
Advances in Intrusion Detection (RAID)-2003 LNCS
2820:220-237.
Valdes, A., Anderson, D., 1995. Statistical Methods for
Computer Usage Anomaly Detection Using NIDES.
Technical Report, SRI International.
Vigna, G., Kemmerer, R.A., 1998. NetSTAT a network-
based Intrusion Detection Approach. Proceedings of
14th Annual Computer Security Applications Confer-
ence:25-34.
Ye, N., Emran, S.M., Chen, Q., Vilbert, S., 2002. Multivari-
ate Statistical Analysis of Audit Trails for Host-Based
Intrusion Detection. IEEE Transactions on computers,
51(7):810-820.
Zhang, Z., Li, J., Manikopoulos, C.N., Jorgenson, J., Ucles,
J., 2001. Neural Networks in Statistical Anomaly
Intrusion Detection. Neural Network Word, Interna-
tional Journal of Non-Standard Computing and Arti-
ficial Intelligence, 11(3):305-316
DETECTING ANOMALOUS TRAFFIC USING STATISTICAL PROCESSING AND SELF-ORGANIZING MAPS
79