Figure 4: Results from Experiment 5.
6 CONCLUSION AND FUTURE
WORK
We have proposed LADS, a Live Anomaly Detection
System that uses unsupervised machine learning al-
gorithms to detect anomalies after a training process
of a given dataset. The approach analyses the perfor-
mance of a well known machine learning algorithm:
One class support vector machine (One-Class SVM)
under different test environments (e.g., using one or
multiple IP features), making it possible to identify
which approach performs better in detecting legiti-
mate and anomalous traffic. Training is done offline
using valid datasets, but predictions are done in real
time, making it possible to detect anomalous behav-
ior of the current system’s traffic.
Results show that a combination of multiple fea-
tures (i.e., IP source, IP destination, distance between
IPs, IP known, IP unknown) provides more accurate
results and reduces considerably the false rates in the
analysis performed.
It is important to highlight that these experiments
are best suited for the behavior analysis of IoT devices
(e.g., smart security systems, monitoring devices, jam
detectors, smart thermostats, etc.) that generates one
or few signals, and whose behavior can be easily mod-
elled by the LADS. We should exclude computers,
servers and mobile phones in our analysis, as the het-
erogeneity of the traffic they generate will make it dif-
ficult to represent accurate models.
Future work will consider other features to evalu-
ate traffic behavior (e.g., connection time, traffic size,
port source and destination, protocols, etc.) and will
assign a percentage value to each of the evaluated fea-
tures (based on its importance in identifying anoma-
lies) to tune the tool and compare the accuracy of the
results.
ACKNOWLEDGEMENTS
The research in this paper has been partially sup-
ported by the European Commission through the
DiSIEM project, (Grant Agreement No. 700692),
STOP-IT project, (Grant Agreement No. 740610),
and the SerIoT project, (Grant Agreement No.
780139), as well as the LASIGE Research Unit (ref.
UID/CEC/00408/2019).
REFERENCES
Amer, M., Goldstein, M., and Abdennadher, S. (2013). En-
hancing one-class support vector machines for unsu-
pervised anomaly detection. In Proceedings of the
ACM SIGKDD Workshop on Outlier Detection and
Description.
Bradatsch, L. (2019). Anomaly detection based on traffic
records. In International Conference on Networked
Systems.
Lakhina, A., Crovella, M., and Diot, C. (2005). Mining
anomalies using traffic feature distributions. In Con-
ference on Applications, technologies, architectures,
and protocols for computer communications, pages
217–228.
Limthong, K. (2013). Real-time computer network anomaly
detection using machine learning techniques. In Jour-
nal of Advances in Computer Networks, volume 1(1).
Mulay, S. A., Devale, P., and Garje, G. (2010). Intrusion
detection system using support vector machine and
decision tree. In International Journal of Computer
Applications, volume 3(3), pages 40–43.
Pedregosa, F., Varoquaux, G., Gramfort, A., Michel, V.,
Thirion, B., Grisel, O., Blondel, M., Prettenhofer, P.,
Weiss, R., Dubourg, V., Vanderplas, J., Passos, A.,
Cournapeau, D., Brucher, M., Perrot, M., and Duch-
esnay, E. (2011). Scikit-learn: Machine learning in
python. In Journal of Machine Learning Research,
volume 12, pages 2825–2830.
Vaarandi, R. (2013). Detecting anomalous network traffic
in organizational private networks. In International
Multi-Disciplinary Conference on Cognitive Methods
in Situation Awareness and Decision Support.
Wagner, C., Francois, J., State, R., and Engel, T.
(2011). Machine learning approach for ip-flow record
anomaly detection. In International IFIP TC 6 Con-
ference on Networking, pages 28–39.
Xu, X. and Wang, X. (2005). An adaptive network intrusion
detection method based on pca and support vector ma-
chines. In Advanced Data Mining and Applications,
pages 696–703.
Zhang, R., Zhang, S., Lan, Y., and Jiang, J. (2008). Network
anomaly detection using one class support vector ma-
chine. In Proceedings of the International MultiCon-
ference of Engineers and Computer Scientists.
LADS: A Live Anomaly Detection System based on Machine Learning Methods
469