Cargando…

Flow-Data Gathering Using NetFlow Sensors for Fitting Malicious-Traffic Detection Models

Advanced persistent threats (APTs) are a growing concern in cybersecurity. Many companies and governments have reported incidents related to these threats. Throughout the life cycle of an APT, one of the most commonly used techniques for gaining access is network attacks. Tools based on machine lear...

Descripción completa

Detalles Bibliográficos
Autores principales: Campazas-Vega, Adrián, Crespo-Martínez, Ignacio Samuel, Guerrero-Higueras, Ángel Manuel, Fernández-Llamas, Camino
Formato: Online Artículo Texto
Lenguaje:English
Publicado: MDPI 2020
Materias:
Acceso en línea:https://www.ncbi.nlm.nih.gov/pmc/articles/PMC7766632/
https://www.ncbi.nlm.nih.gov/pubmed/33353086
http://dx.doi.org/10.3390/s20247294
_version_ 1783628765076652032
author Campazas-Vega, Adrián
Crespo-Martínez, Ignacio Samuel
Guerrero-Higueras, Ángel Manuel
Fernández-Llamas, Camino
author_facet Campazas-Vega, Adrián
Crespo-Martínez, Ignacio Samuel
Guerrero-Higueras, Ángel Manuel
Fernández-Llamas, Camino
author_sort Campazas-Vega, Adrián
collection PubMed
description Advanced persistent threats (APTs) are a growing concern in cybersecurity. Many companies and governments have reported incidents related to these threats. Throughout the life cycle of an APT, one of the most commonly used techniques for gaining access is network attacks. Tools based on machine learning are effective in detecting these attacks. However, researchers usually have problems with finding suitable datasets for fitting their models. The problem is even harder when flow data are required. In this paper, we describe a framework to gather flow datasets using a NetFlow sensor. We also present the Docker-based framework for gathering netflow data (DOROTHEA), a Docker-based solution implementing the above framework. This tool aims to easily generate taggable network traffic to build suitable datasets for fitting classification models. In order to demonstrate that datasets gathered with DOROTHEA can be used for fitting classification models for malicious-traffic detection, several models were built using the model evaluator (MoEv), a general-purpose tool for training machine-learning algorithms. After carrying out the experiments, four models obtained detection rates higher than 93%, thus demonstrating the validity of the datasets gathered with the tool.
format Online
Article
Text
id pubmed-7766632
institution National Center for Biotechnology Information
language English
publishDate 2020
publisher MDPI
record_format MEDLINE/PubMed
spelling pubmed-77666322020-12-28 Flow-Data Gathering Using NetFlow Sensors for Fitting Malicious-Traffic Detection Models Campazas-Vega, Adrián Crespo-Martínez, Ignacio Samuel Guerrero-Higueras, Ángel Manuel Fernández-Llamas, Camino Sensors (Basel) Article Advanced persistent threats (APTs) are a growing concern in cybersecurity. Many companies and governments have reported incidents related to these threats. Throughout the life cycle of an APT, one of the most commonly used techniques for gaining access is network attacks. Tools based on machine learning are effective in detecting these attacks. However, researchers usually have problems with finding suitable datasets for fitting their models. The problem is even harder when flow data are required. In this paper, we describe a framework to gather flow datasets using a NetFlow sensor. We also present the Docker-based framework for gathering netflow data (DOROTHEA), a Docker-based solution implementing the above framework. This tool aims to easily generate taggable network traffic to build suitable datasets for fitting classification models. In order to demonstrate that datasets gathered with DOROTHEA can be used for fitting classification models for malicious-traffic detection, several models were built using the model evaluator (MoEv), a general-purpose tool for training machine-learning algorithms. After carrying out the experiments, four models obtained detection rates higher than 93%, thus demonstrating the validity of the datasets gathered with the tool. MDPI 2020-12-18 /pmc/articles/PMC7766632/ /pubmed/33353086 http://dx.doi.org/10.3390/s20247294 Text en © 2020 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (http://creativecommons.org/licenses/by/4.0/).
spellingShingle Article
Campazas-Vega, Adrián
Crespo-Martínez, Ignacio Samuel
Guerrero-Higueras, Ángel Manuel
Fernández-Llamas, Camino
Flow-Data Gathering Using NetFlow Sensors for Fitting Malicious-Traffic Detection Models
title Flow-Data Gathering Using NetFlow Sensors for Fitting Malicious-Traffic Detection Models
title_full Flow-Data Gathering Using NetFlow Sensors for Fitting Malicious-Traffic Detection Models
title_fullStr Flow-Data Gathering Using NetFlow Sensors for Fitting Malicious-Traffic Detection Models
title_full_unstemmed Flow-Data Gathering Using NetFlow Sensors for Fitting Malicious-Traffic Detection Models
title_short Flow-Data Gathering Using NetFlow Sensors for Fitting Malicious-Traffic Detection Models
title_sort flow-data gathering using netflow sensors for fitting malicious-traffic detection models
topic Article
url https://www.ncbi.nlm.nih.gov/pmc/articles/PMC7766632/
https://www.ncbi.nlm.nih.gov/pubmed/33353086
http://dx.doi.org/10.3390/s20247294
work_keys_str_mv AT campazasvegaadrian flowdatagatheringusingnetflowsensorsforfittingmalicioustrafficdetectionmodels
AT crespomartinezignaciosamuel flowdatagatheringusingnetflowsensorsforfittingmalicioustrafficdetectionmodels
AT guerrerohiguerasangelmanuel flowdatagatheringusingnetflowsensorsforfittingmalicioustrafficdetectionmodels
AT fernandezllamascamino flowdatagatheringusingnetflowsensorsforfittingmalicioustrafficdetectionmodels