Machine Learning Techniques for Identifying Anomalous Network Traffic
Author
Garza, Victor R.
Wood, Brian P.
Monaco, John V.
Blockmon, Ray
Males, Nathaniel
Niemann, Natasha
Ross, John
Date
2020-10-14Advisor
Garza, Victor R.
Wood, Brian P.
Monaco, John V.
Metadata
Show full item recordAbstract
Cyber investigations often involve analysis of large volumes of log files, including network flow data. Machine learning (ML) techniques allow analysts and examiners to more quickly identify traffic flows relevant to the investigation. The research will focus on the analysis of network flow data generated by the Audit Record Generation and Utilization System (ARGUS). Examples of anomalous traffic patterns of interest (not an exhaustive list) include traffic spikes, malware beaconing, command and control (C2) activity, data exfiltration, and scanning. The objective of the proposed study is to analyze network flow data with ML and heuristics algorithms to optimize time spent by analysts and investigators during cyber network forensic investigations (including, but not limited to, cyber incident handling and incident response investigations). We are analyzing ARGUS, and other network flow application data, with ML algorithms, with a focus on targeting and optimizing indicators-of-compromise (IOCs). ML is being leveraged to mine network flows to optimize the determination and identification of an ongoing compromise, or historical evidence of compromise (mining C2 channel data, beaconing, data exfiltration, unexpected encrypted traffic, or other anomalous network traffic). After an extensive review of various market solutions, we found that there is a general paucity of specific products addressing forensic analysis of anomalous network traffic a number of vendor products are headed in the direction of using ML algorithms that can be considered as a solution in analyzing network traffic flow. An analysis of the 10+ possibilities have been produced.
Rights
This publication is a work of the U.S. Government as defined in Title 17, United States Code, Section 101. Copyright protection is not available for this work in the United States.NPS Report Number
NRP-20-N033ARelated items
Showing items related by title, author, creator and subject.
-
Analysis of traffic signals on a software-defined network for detection and classification of a man-in-the-middle attack
D’Orsaneo, Julian N. (Monterey, California: Naval Postgraduate School, 2017-09);Software-defined networking (SDN) has the potential to revolutionize the management capabilities of a highly distributed military communications environment. Yet, military adoption of SDN is contingent on a thorough analysis ... -
DETECTION OF SYNTHETIC ANOMALIES ON AN EXPERIMENTALLY GENERATED 5G DATA SET USING CONVOLUTIONAL NEURAL NETWORKS
Edmond, Ashley E. (Monterey, CA; Naval Postgraduate School, 2022-09);The research microgrid currently deployed at Marine Corps Air Station, Miramar, is leveraging Verizon’s Non-Standalone (NSA) 5G communications network to provide connectivity between dispersed energy assets and the energy ... -
Cyber System Assurance through Improved Network Anomaly Modeling and Detection
Bollmann, Chad A. (Monterey, California: Naval Postgraduate SchoolMonterey, California. Naval Postgraduate School, 2019-12); NPS-19-N039-AThe objectives of this work were to investigate the source of the dual natures of network traffic (i.e., Gaussian and alpha-stable) in order prove the merit of further development, improvement, and application of non-parametric ...