Applying One-Class Classification Techniques to IP Flow Records for Intrusion Detection

UMER Muhammad Fahad, SHER Muhammad, Yaxin Bi

Research output: Contribution to journalArticlepeer-review

69 Downloads (Pure)


Flow-basedintrusiondetectionsystemsanalyzeIPflowrecordstodetectattacksagainst computer networks. IP flow records contain aggregated packet header information; therefore, the amount of data processed by the intrusion detection system is reduced. In addition, since no pay- load is analyzed, the end-to-end encryption does not affect the deployment of intermediate intru- sion detection system. In this paper, we evaluate one-class classification techniques for detection of malicious flows at an initial stage of a multi-stage flow-based intrusion detection system. The initial stage uses minimal flow attributes and only decide if the IP flow is normal or malicious. Since there is only one class of interest (malicious) at the initial stage, we use one-class classifi- cation for detection of malicious flows. In this paper, we review available one-class classification techniques and evaluate them on a flow-based dataset to determine their performance for detec- tion of malicious flows. Our results show that one-class classification techniques using boundary methods give best results in detection of malicious IP flows.
Original languageEnglish
Pages (from-to)70-86
JournalBaltic Journal of Modern Computing
Issue number1
Publication statusPublished (in print/issue) - 23 Mar 2017


  • Intrusion detection
  • IP flows
  • One-class classification


Dive into the research topics of 'Applying One-Class Classification Techniques to IP Flow Records for Intrusion Detection'. Together they form a unique fingerprint.

Cite this