Top Banner
Intelligent Database Systems Presenter : YAN-SHOU SIE Authors : E.J. Palomo , J. North , D. Elizondo , R.M. Luque , T. Watson 2012. NN Application of growing hierarchical SOM for visualisation of network forensics traffic data
17

Intelligent Database Systems Lab Presenter : YAN-SHOU SIE Authors : E.J. Palomo, J. North, D. Elizondo, R.M. Luque, T. Watson 2012. NN Application of growing.

Jan 20, 2016

Download

Documents

Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Intelligent Database Systems Lab Presenter : YAN-SHOU SIE Authors : E.J. Palomo, J. North, D. Elizondo, R.M. Luque, T. Watson 2012. NN Application of growing.

Intelligent Database Systems Lab

Presenter : YAN-SHOU SIE

Authors : E.J. Palomo , J. North , D. Elizondo , R.M. Luque

, T. Watson

2012. NN

Application of growing hierarchical SOM for visualisation of network forensics traffic data

Page 2: Intelligent Database Systems Lab Presenter : YAN-SHOU SIE Authors : E.J. Palomo, J. North, D. Elizondo, R.M. Luque, T. Watson 2012. NN Application of growing.

Intelligent Database Systems Lab

Outlines

MotivationObjectivesMethodologyExperimentsConclusionsComments

Page 3: Intelligent Database Systems Lab Presenter : YAN-SHOU SIE Authors : E.J. Palomo, J. North, D. Elizondo, R.M. Luque, T. Watson 2012. NN Application of growing.

Intelligent Database Systems Lab

Motivation

• In information burst age,network of packets are too large cause network attack pattern difficult to find and identifying the error's data in the pattern that data take.

Page 4: Intelligent Database Systems Lab Presenter : YAN-SHOU SIE Authors : E.J. Palomo, J. North, D. Elizondo, R.M. Luque, T. Watson 2012. NN Application of growing.

Intelligent Database Systems Lab

Objectives

• We utilize GHSOM to find network attack pattern , have following advantage:– A visualisation technique can more intuitive and

understandable.– Network attack pattern be easy find or judge.

Page 5: Intelligent Database Systems Lab Presenter : YAN-SHOU SIE Authors : E.J. Palomo, J. North, D. Elizondo, R.M. Luque, T. Watson 2012. NN Application of growing.

Intelligent Database Systems Lab

Methodology• Growing hierarchical self-organising map– consists of several growing SOMs

arranged in layers– quantitative features– qualitative features

Page 6: Intelligent Database Systems Lab Presenter : YAN-SHOU SIE Authors : E.J. Palomo, J. North, D. Elizondo, R.M. Luque, T. Watson 2012. NN Application of growing.

Intelligent Database Systems Lab

Methodology• GHSOM flow charts

Page 7: Intelligent Database Systems Lab Presenter : YAN-SHOU SIE Authors : E.J. Palomo, J. North, D. Elizondo, R.M. Luque, T. Watson 2012. NN Application of growing.

Intelligent Database Systems Lab

• Euclidean distance

• quantisation error

• hierarchical growth controlled

Methodology

Page 8: Intelligent Database Systems Lab Presenter : YAN-SHOU SIE Authors : E.J. Palomo, J. North, D. Elizondo, R.M. Luque, T. Watson 2012. NN Application of growing.

Intelligent Database Systems Lab

Methodology• winning neuron of the map

• weight vector update

• map growth controlled

Page 9: Intelligent Database Systems Lab Presenter : YAN-SHOU SIE Authors : E.J. Palomo, J. North, D. Elizondo, R.M. Luque, T. Watson 2012. NN Application of growing.

Intelligent Database Systems Lab

Experiments• Feature extraction

• Finally feature subset – qualitative : IP source address, IP destination address , protocol

type , source port

– quantitative :date, time, packet length and delta time

Captured packets

handled missing value

Feature selection

Page 10: Intelligent Database Systems Lab Presenter : YAN-SHOU SIE Authors : E.J. Palomo, J. North, D. Elizondo, R.M. Luque, T. Watson 2012. NN Application of growing.

Intelligent Database Systems Lab

Experiments• Data visualization

3D GHSOM 2D GHSOM

Page 11: Intelligent Database Systems Lab Presenter : YAN-SHOU SIE Authors : E.J. Palomo, J. North, D. Elizondo, R.M. Luque, T. Watson 2012. NN Application of growing.

Intelligent Database Systems Lab

Experiments• plot of the input data hits

Layer-1

Layer-2

Page 12: Intelligent Database Systems Lab Presenter : YAN-SHOU SIE Authors : E.J. Palomo, J. North, D. Elizondo, R.M. Luque, T. Watson 2012. NN Application of growing.

Intelligent Database Systems Lab

Experiments• U-matrix

Layer-1

Layer-2

Page 13: Intelligent Database Systems Lab Presenter : YAN-SHOU SIE Authors : E.J. Palomo, J. North, D. Elizondo, R.M. Luque, T. Watson 2012. NN Application of growing.

Intelligent Database Systems Lab

Experiments• Component planes – Layer 1

Layer-1

Page 14: Intelligent Database Systems Lab Presenter : YAN-SHOU SIE Authors : E.J. Palomo, J. North, D. Elizondo, R.M. Luque, T. Watson 2012. NN Application of growing.

Intelligent Database Systems Lab

Experiments• Component planes– Layer 2

Layer-2

Page 15: Intelligent Database Systems Lab Presenter : YAN-SHOU SIE Authors : E.J. Palomo, J. North, D. Elizondo, R.M. Luque, T. Watson 2012. NN Application of growing.

Intelligent Database Systems Lab

Experiments• distribution of countries of origin

Page 16: Intelligent Database Systems Lab Presenter : YAN-SHOU SIE Authors : E.J. Palomo, J. North, D. Elizondo, R.M. Luque, T. Watson 2012. NN Application of growing.

Intelligent Database Systems Lab

Conclusions• The results show that the GHSOM can be used to

cluster network traffic data and to represent this in a manner that can be of aid in network forensics. Therefore,this information can allow an expert in the field to successfully conclude a digital investigation.

Page 17: Intelligent Database Systems Lab Presenter : YAN-SHOU SIE Authors : E.J. Palomo, J. North, D. Elizondo, R.M. Luque, T. Watson 2012. NN Application of growing.

Intelligent Database Systems Lab

Comments• Advantages– Use visualisation technique help user can more

intuitive and understandable to watch data.

• Applications– Network forensics– network forensics