Paper Status Tracking
Contact us
customer@davidpublishing.com
Click here to send a message to me 3275638434
Paper Publishing WeChat

Article
Affiliation(s)

Electrical and Computer Engineering Department, California State Polytechnic University Pomona, CA 91768, United States

ABSTRACT

The critical nature of satellite network traffic provides a challenging environment to detect intrusions. The intrusion detection method presented aims to raise an alert whenever satellite network signals begin to exhibit anomalous patterns determined by Euclidian distance metric. In line with anomaly-based intrusion detection systems, the method presented relies heavily on building a model of “normal” through the creation of a signal dictionary using windowing and k-means clustering. The results of three signals from our case study are discussed to highlight the benefits and drawbacks of the method presented. Our preliminary results demonstrate that the clustering technique used has great potential for intrusion detection for non-periodic satellite network signals.

KEYWORDS

Intrusion detection, irregular data, K-means clustering, machine learning, signal dictionary

Cite this paper

References
[1] Stallings, W. 2011. Cryptography and Network Security Principles and Practice. New York: Pearson.
[2] Chadola, V., Banerjee A., and Kuma, V. 2009. “Anomaly Detection: A Survey.” ACM Computer Surveys (CSUR) 41 (3): 1-58. 
[3] Garcia-Teodoro, P., Diaz-Verdejo, J., Macia-Fernandez, G., and Vazquez, E. 2009. “Anomaly-Based Network Intrusion Detection: Techniques, Systems and Challenges.” Computers and Security 28 (1-2): 18-28. 
[4] Patcha, A., and Park, J. 2007. “An Overview of Anomaly Detection Techniques: Existing Solutions and Latest Technological Trends.” Computer Networks 51 (12): 3448-70. 
[5] Pimentel, M., Clifton, D., Clifton, L., and Tarassenko, L. 2014. “A Review of Novelty Detection.” Signal Processing 99: 215-49. 
[6] Cheboli, D. 2010. “Anomaly Detection of Time   Series.” Master Thesis, University of Minnesota, Minneapolis.
[7] Dunning, T., and Friedman, E. 2014. Practical Machine Learning: A New Look at Anomaly Detection. Sebastopol: O’Reilly Media, Inc.
[8] Gonzalez, R., and Tou, J. 1974. Pattern Recognition Principles. Reading: Addison-Wesley Publishing Co. 
[9] Arthur, D., and Vassilvitskii, S. 2007. “K-means++: The Advantages of Careful Seeding.” In Proceedings of the Eighteenth Annual ACM-SIAM Symposium on Discrete Algorithms, Philadelphia. 

About | Terms & Conditions | Issue | Privacy | Contact us
Copyright © 2001 - David Publishing Company All rights reserved, www.davidpublisher.com
3 Germay Dr., Unit 4 #4651, Wilmington DE 19804; Tel: 001-302-3943358 Email: order@davidpublishing.com