SlideShare a Scribd company logo
Network behavioral clustering engine
What do we do?

We use machine learning to empower
organizations to get a clearer view of their
networks

2
What do we offer?
›

Network Behavioral Clustering Engine
› NBCE is a set of technologies whose main objective is analyze
the structural differences among normal and malicious traffic
generated by cyber attacks and network intrusions.
› BCE characterizes the normal traffic using clustering and
propose how the normal traffic should look like at a specific
point in time.

3
What do we use?
Online machine learning. A paradigm shift
….00100110100101….
Online In memory Analytics

Memory

Memory

Disk

Off-line
moves to
Online

Disk
Only Analysis
Results are stored

Large Analysis process

What’s the benefit?

› Not all the generated data represents useful information
› Historical information is not always available (E.g. Electric car
adoption, new traffic in the network M2M)
› Need to react instantly to meaningful changes in data. (E.g. trends on
market stock exchange)
Intrusion/Attack detection
› Intrusion detection is the process of monitoring the events occurring in
a computer system or network and analyzing them for signs of
possible incidents.
› Incidents are violations or imminent threats of violation of:
› computer security policies.
› acceptable use policies.
› standard security practices.
› An intrusion detection system (IDS) is software that automates the
intrusion detection process.
› IDSs are primarily focuses on identifying possible incidents and
detecting when an attacker has successfully compromised a system
by exploiting vulnerability in the system.
Intrusion/Attack detection
Detection approaches
› Signature-Based Detection.
› A signature is a pattern that corresponds to a known threat (e.g. a
DoS attack). It is the process of comparing signatures against
observed events to identify possible incidents.
› Anomaly-Based Detection
› The process of comparing definitions of what activity is considered
normal against observed events to identify significant deviations.
Capable of detecting previously unknown threats. It is not required
to have a previous labeled dataset.
Using Clustering for Intrusion Detection
A Set of
Unlabeled
Data

Unsupervised
Anomaly Detection
Algorithm

› Assumptions for unsupervised anomaly
detection algorithm:

Detected Intrusion
Clusters

Comparison with
Detected Clusters

› The intrusions are rare with respect to normal network
traffic.

› The intrusions are different from normal network traffic.
› As a Result:
› The intrusions will appear as outliers in the data.

Detected malicious
attacks
Using Clustering for Intrusion
Detection
› The unsupervised anomaly detection
algorithm clusters the unlabeled data
instances together into clusters using a
simple distance-based metric.
› Once data is clustered, all of the instances
that appear in small clusters are labeled as
anomalies because:
› The normal instances should form
large clusters compared to the
intrusions,
› Malicious intrusions and normal
instances are qualitatively different, so
they do not fall into the same cluster.
Metric & Normalization
• Euclidean Metric
(for distance computation)
• Feature Normalization
(to eliminate the difference in the scale of features)

9/29
Methodology
› Feed the traffic data into the system
› Distribute the traffic across the Turing Nodes
› Red-Means Algorithm:
› Feature selection
› Run the distributed clustered algorithm
› Dynamic cluster number discover
› Major cluster metrics calculation
› Collect the results from the nodes to a central point
› Logistic Regression
› Compare the results with the predictive model
› Re-train the model if it required
› Mark the current situation as normal or abnormal
NBCE Architecture
Streaming

Text/XML
Files

Kantor Nodes

Turing Nodes

Internal
Comm system

Picasso Node

Communicator

Red-Means Algorithm

Comm External Sys

Feature distribution

Configuration File
DB
Access

Internal
Comm system

SMNP
Console
SOAP Notification

Logistic regression

› Kantor is the
› Turing is the core. It
listener of the
distributes the
Turing Nodes
system. It reads
clustering algorithm,
or listen from
collects results and
streaming,
create a prediction
sockets, text files
model about how the
or dbs.
traffic should behave
in the future.

› Picasso is the data
visualization
component. It
shows in a friendly
manner how traffic
looks like and how
it will be.
Network behavioral clustering engine

More Related Content

DOC
A system for denial of-service attack detection based on multivariate correla...
DOCX
A system for denial of-service attack detection based on multivariate correla...
DOC
Evaluating the vulnerability of network traffic using joint security and rout...
DOCX
IEEE 2014 DOTNET PARALLEL DISTRIBUTED PROJECTS A system-for-denial-of-service...
PDF
Internet ttraffic monitering anomalous behiviour detection
DOCX
Secure data aggregation technique for wireless
DOCX
JPD1424 A System for Denial-of-Service Attack Detection Based on Multivariat...
PPTX
Mobile fraud detection using neural networks
A system for denial of-service attack detection based on multivariate correla...
A system for denial of-service attack detection based on multivariate correla...
Evaluating the vulnerability of network traffic using joint security and rout...
IEEE 2014 DOTNET PARALLEL DISTRIBUTED PROJECTS A system-for-denial-of-service...
Internet ttraffic monitering anomalous behiviour detection
Secure data aggregation technique for wireless
JPD1424 A System for Denial-of-Service Attack Detection Based on Multivariat...
Mobile fraud detection using neural networks

What's hot (20)

DOCX
Secure data aggregation technique for wireless sensor networks in the presenc...
PDF
Icacci presentation-cnn intrusion
DOCX
a system for denial-of-service attack detection based on multivariate correla...
DOCX
A system for-denial-of-service-attack-detection-based-on-multivariate-correla...
PDF
Application of Data Mining Technique in Invasion Recognition
DOCX
a system for denial-of-service attack detection based on multivariate correla...
PDF
IRJET - Network Traffic Monitoring and Botnet Detection using K-ANN Algorithm
PPTX
A system for denial of-service attack detection based on multivariate correla...
PDF
FLOODING ATTACK DETECTION AND MITIGATION IN SDN WITH MODIFIED ADAPTIVE THRESH...
DOCX
Chapter 1 organizing data vantage domain action and validity
PDF
A data driven approach for monitoring network events
PDF
IRJET - Crime Analysis and Prediction - by using DBSCAN Algorithm
PDF
Iaetsd a survey on detecting denial-of-service attacks
PDF
A System for Denial of Service Attack Detection Based On Multivariate Corelat...
PPTX
Network Miner Network forensics
PDF
IRJET- Review on Intrusion Detection System using Recurrent Neural Network wi...
PPTX
fault localization in computer network..
DOCX
Network intrusion detection using supervised machine learning technique with ...
PDF
Online stream mining approach for clustering network traffic
PDF
Online stream mining approach for clustering network traffic
Secure data aggregation technique for wireless sensor networks in the presenc...
Icacci presentation-cnn intrusion
a system for denial-of-service attack detection based on multivariate correla...
A system for-denial-of-service-attack-detection-based-on-multivariate-correla...
Application of Data Mining Technique in Invasion Recognition
a system for denial-of-service attack detection based on multivariate correla...
IRJET - Network Traffic Monitoring and Botnet Detection using K-ANN Algorithm
A system for denial of-service attack detection based on multivariate correla...
FLOODING ATTACK DETECTION AND MITIGATION IN SDN WITH MODIFIED ADAPTIVE THRESH...
Chapter 1 organizing data vantage domain action and validity
A data driven approach for monitoring network events
IRJET - Crime Analysis and Prediction - by using DBSCAN Algorithm
Iaetsd a survey on detecting denial-of-service attacks
A System for Denial of Service Attack Detection Based On Multivariate Corelat...
Network Miner Network forensics
IRJET- Review on Intrusion Detection System using Recurrent Neural Network wi...
fault localization in computer network..
Network intrusion detection using supervised machine learning technique with ...
Online stream mining approach for clustering network traffic
Online stream mining approach for clustering network traffic
Ad

Similar to Network behavioral clustering engine (20)

PPTX
Intrusion Detection with Neural Networks
DOCX
2014 IEEE DOTNET PARALLEL DISTRIBUTED PROJECT A system-for-denial-of-service-...
PPTX
Understanding Intrusion Detection & Prevention Systems (1).pptx
DOCX
IEEE 2014 DOTNET PARALLEL DISTRIBUTED PROJECTS A probabilistic-misbehavior-de...
DOCX
2014 IEEE DOTNET PARALLEL DISTRIBUTED PROJECT A probabilistic-misbehavior-det...
PPTX
Role of data mining in cyber security
PPSX
Ids 00 introduction_ intrusion detection & prevention systems
PDF
IRJET- An Intrusion Detection Framework based on Binary Classifiers Optimized...
DOCX
JPD1423 A Probabilistic Misbehavior Detection Scheme toward Efficient Trust ...
DOCX
A_Measurement_Approach_for_Inline_Intrusion_Detection_of_Heartbleed-Like_Atta...
PDF
Volume 2-issue-6-2190-2194
PDF
Volume 2-issue-6-2190-2194
PDF
M41028892
PDF
IRJET- Genetic Algorithm based Intrusion Detection-Survey
PDF
Comparative Analysis of K-Means Data Mining and Outlier Detection Approach fo...
DOCX
a probabilistic misbehavior detection scheme toward efficient trust establish...
PDF
DETECTING NETWORK ANOMALIES USING CUSUM and FCM
PDF
FORTIFICATION OF HYBRID INTRUSION DETECTION SYSTEM USING VARIANTS OF NEURAL ...
PDF
A Survey On Intrusion Detection Systems
PDF
MACHINE LEARNING AND DEEP LEARNING MODEL-BASED DETECTION OF IOT BOTNET ATTACKS.
Intrusion Detection with Neural Networks
2014 IEEE DOTNET PARALLEL DISTRIBUTED PROJECT A system-for-denial-of-service-...
Understanding Intrusion Detection & Prevention Systems (1).pptx
IEEE 2014 DOTNET PARALLEL DISTRIBUTED PROJECTS A probabilistic-misbehavior-de...
2014 IEEE DOTNET PARALLEL DISTRIBUTED PROJECT A probabilistic-misbehavior-det...
Role of data mining in cyber security
Ids 00 introduction_ intrusion detection & prevention systems
IRJET- An Intrusion Detection Framework based on Binary Classifiers Optimized...
JPD1423 A Probabilistic Misbehavior Detection Scheme toward Efficient Trust ...
A_Measurement_Approach_for_Inline_Intrusion_Detection_of_Heartbleed-Like_Atta...
Volume 2-issue-6-2190-2194
Volume 2-issue-6-2190-2194
M41028892
IRJET- Genetic Algorithm based Intrusion Detection-Survey
Comparative Analysis of K-Means Data Mining and Outlier Detection Approach fo...
a probabilistic misbehavior detection scheme toward efficient trust establish...
DETECTING NETWORK ANOMALIES USING CUSUM and FCM
FORTIFICATION OF HYBRID INTRUSION DETECTION SYSTEM USING VARIANTS OF NEURAL ...
A Survey On Intrusion Detection Systems
MACHINE LEARNING AND DEEP LEARNING MODEL-BASED DETECTION OF IOT BOTNET ATTACKS.
Ad

Recently uploaded (20)

PDF
Heart disease approach using modified random forest and particle swarm optimi...
PDF
Web App vs Mobile App What Should You Build First.pdf
PDF
Video forgery: An extensive analysis of inter-and intra-frame manipulation al...
PPTX
SOPHOS-XG Firewall Administrator PPT.pptx
PDF
A novel scalable deep ensemble learning framework for big data classification...
PPTX
A Presentation on Artificial Intelligence
PDF
Univ-Connecticut-ChatGPT-Presentaion.pdf
PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
PDF
DP Operators-handbook-extract for the Mautical Institute
PDF
Enhancing emotion recognition model for a student engagement use case through...
PPTX
Group 1 Presentation -Planning and Decision Making .pptx
PDF
project resource management chapter-09.pdf
PPTX
A Presentation on Touch Screen Technology
PDF
WOOl fibre morphology and structure.pdf for textiles
PDF
Zenith AI: Advanced Artificial Intelligence
PDF
DASA ADMISSION 2024_FirstRound_FirstRank_LastRank.pdf
PPTX
TechTalks-8-2019-Service-Management-ITIL-Refresh-ITIL-4-Framework-Supports-Ou...
PDF
Transform Your ITIL® 4 & ITSM Strategy with AI in 2025.pdf
PDF
Hybrid model detection and classification of lung cancer
PDF
1 - Historical Antecedents, Social Consideration.pdf
Heart disease approach using modified random forest and particle swarm optimi...
Web App vs Mobile App What Should You Build First.pdf
Video forgery: An extensive analysis of inter-and intra-frame manipulation al...
SOPHOS-XG Firewall Administrator PPT.pptx
A novel scalable deep ensemble learning framework for big data classification...
A Presentation on Artificial Intelligence
Univ-Connecticut-ChatGPT-Presentaion.pdf
Digital-Transformation-Roadmap-for-Companies.pptx
DP Operators-handbook-extract for the Mautical Institute
Enhancing emotion recognition model for a student engagement use case through...
Group 1 Presentation -Planning and Decision Making .pptx
project resource management chapter-09.pdf
A Presentation on Touch Screen Technology
WOOl fibre morphology and structure.pdf for textiles
Zenith AI: Advanced Artificial Intelligence
DASA ADMISSION 2024_FirstRound_FirstRank_LastRank.pdf
TechTalks-8-2019-Service-Management-ITIL-Refresh-ITIL-4-Framework-Supports-Ou...
Transform Your ITIL® 4 & ITSM Strategy with AI in 2025.pdf
Hybrid model detection and classification of lung cancer
1 - Historical Antecedents, Social Consideration.pdf

Network behavioral clustering engine

  • 2. What do we do? We use machine learning to empower organizations to get a clearer view of their networks 2
  • 3. What do we offer? › Network Behavioral Clustering Engine › NBCE is a set of technologies whose main objective is analyze the structural differences among normal and malicious traffic generated by cyber attacks and network intrusions. › BCE characterizes the normal traffic using clustering and propose how the normal traffic should look like at a specific point in time. 3
  • 4. What do we use? Online machine learning. A paradigm shift ….00100110100101…. Online In memory Analytics Memory Memory Disk Off-line moves to Online Disk Only Analysis Results are stored Large Analysis process What’s the benefit? › Not all the generated data represents useful information › Historical information is not always available (E.g. Electric car adoption, new traffic in the network M2M) › Need to react instantly to meaningful changes in data. (E.g. trends on market stock exchange)
  • 5. Intrusion/Attack detection › Intrusion detection is the process of monitoring the events occurring in a computer system or network and analyzing them for signs of possible incidents. › Incidents are violations or imminent threats of violation of: › computer security policies. › acceptable use policies. › standard security practices. › An intrusion detection system (IDS) is software that automates the intrusion detection process. › IDSs are primarily focuses on identifying possible incidents and detecting when an attacker has successfully compromised a system by exploiting vulnerability in the system.
  • 6. Intrusion/Attack detection Detection approaches › Signature-Based Detection. › A signature is a pattern that corresponds to a known threat (e.g. a DoS attack). It is the process of comparing signatures against observed events to identify possible incidents. › Anomaly-Based Detection › The process of comparing definitions of what activity is considered normal against observed events to identify significant deviations. Capable of detecting previously unknown threats. It is not required to have a previous labeled dataset.
  • 7. Using Clustering for Intrusion Detection A Set of Unlabeled Data Unsupervised Anomaly Detection Algorithm › Assumptions for unsupervised anomaly detection algorithm: Detected Intrusion Clusters Comparison with Detected Clusters › The intrusions are rare with respect to normal network traffic. › The intrusions are different from normal network traffic. › As a Result: › The intrusions will appear as outliers in the data. Detected malicious attacks
  • 8. Using Clustering for Intrusion Detection › The unsupervised anomaly detection algorithm clusters the unlabeled data instances together into clusters using a simple distance-based metric. › Once data is clustered, all of the instances that appear in small clusters are labeled as anomalies because: › The normal instances should form large clusters compared to the intrusions, › Malicious intrusions and normal instances are qualitatively different, so they do not fall into the same cluster.
  • 9. Metric & Normalization • Euclidean Metric (for distance computation) • Feature Normalization (to eliminate the difference in the scale of features) 9/29
  • 10. Methodology › Feed the traffic data into the system › Distribute the traffic across the Turing Nodes › Red-Means Algorithm: › Feature selection › Run the distributed clustered algorithm › Dynamic cluster number discover › Major cluster metrics calculation › Collect the results from the nodes to a central point › Logistic Regression › Compare the results with the predictive model › Re-train the model if it required › Mark the current situation as normal or abnormal
  • 11. NBCE Architecture Streaming Text/XML Files Kantor Nodes Turing Nodes Internal Comm system Picasso Node Communicator Red-Means Algorithm Comm External Sys Feature distribution Configuration File DB Access Internal Comm system SMNP Console SOAP Notification Logistic regression › Kantor is the › Turing is the core. It listener of the distributes the Turing Nodes system. It reads clustering algorithm, or listen from collects results and streaming, create a prediction sockets, text files model about how the or dbs. traffic should behave in the future. › Picasso is the data visualization component. It shows in a friendly manner how traffic looks like and how it will be.

Editor's Notes

  • #8: The intrusions are rare with respect to normal network traffic, numberof normal instances is much bigger than number of intrusioninstances. The intrusions are different from normal network traffic, which means intrusionsare qualitatively different from the normal instances.