Cargando…

Utilising Flow Aggregation to Classify Benign Imitating Attacks

Cyber-attacks continue to grow, both in terms of volume and sophistication. This is aided by an increase in available computational power, expanding attack surfaces, and advancements in the human understanding of how to make attacks undetectable. Unsurprisingly, machine learning is utilised to defen...

Descripción completa

Detalles Bibliográficos
Autores principales: Hindy, Hanan, Atkinson, Robert, Tachtatzis, Christos, Bayne, Ethan, Bures, Miroslav, Bellekens, Xavier
Formato: Online Artículo Texto
Lenguaje:English
Publicado: MDPI 2021
Materias:
Acceso en línea:https://www.ncbi.nlm.nih.gov/pmc/articles/PMC7961933/
https://www.ncbi.nlm.nih.gov/pubmed/33806363
http://dx.doi.org/10.3390/s21051761
_version_ 1783665367333208064
author Hindy, Hanan
Atkinson, Robert
Tachtatzis, Christos
Bayne, Ethan
Bures, Miroslav
Bellekens, Xavier
author_facet Hindy, Hanan
Atkinson, Robert
Tachtatzis, Christos
Bayne, Ethan
Bures, Miroslav
Bellekens, Xavier
author_sort Hindy, Hanan
collection PubMed
description Cyber-attacks continue to grow, both in terms of volume and sophistication. This is aided by an increase in available computational power, expanding attack surfaces, and advancements in the human understanding of how to make attacks undetectable. Unsurprisingly, machine learning is utilised to defend against these attacks. In many applications, the choice of features is more important than the choice of model. A range of studies have, with varying degrees of success, attempted to discriminate between benign traffic and well-known cyber-attacks. The features used in these studies are broadly similar and have demonstrated their effectiveness in situations where cyber-attacks do not imitate benign behaviour. To overcome this barrier, in this manuscript, we introduce new features based on a higher level of abstraction of network traffic. Specifically, we perform flow aggregation by grouping flows with similarities. This additional level of feature abstraction benefits from cumulative information, thus qualifying the models to classify cyber-attacks that mimic benign traffic. The performance of the new features is evaluated using the benchmark CICIDS2017 dataset, and the results demonstrate their validity and effectiveness. This novel proposal will improve the detection accuracy of cyber-attacks and also build towards a new direction of feature extraction for complex ones.
format Online
Article
Text
id pubmed-7961933
institution National Center for Biotechnology Information
language English
publishDate 2021
publisher MDPI
record_format MEDLINE/PubMed
spelling pubmed-79619332021-03-17 Utilising Flow Aggregation to Classify Benign Imitating Attacks Hindy, Hanan Atkinson, Robert Tachtatzis, Christos Bayne, Ethan Bures, Miroslav Bellekens, Xavier Sensors (Basel) Article Cyber-attacks continue to grow, both in terms of volume and sophistication. This is aided by an increase in available computational power, expanding attack surfaces, and advancements in the human understanding of how to make attacks undetectable. Unsurprisingly, machine learning is utilised to defend against these attacks. In many applications, the choice of features is more important than the choice of model. A range of studies have, with varying degrees of success, attempted to discriminate between benign traffic and well-known cyber-attacks. The features used in these studies are broadly similar and have demonstrated their effectiveness in situations where cyber-attacks do not imitate benign behaviour. To overcome this barrier, in this manuscript, we introduce new features based on a higher level of abstraction of network traffic. Specifically, we perform flow aggregation by grouping flows with similarities. This additional level of feature abstraction benefits from cumulative information, thus qualifying the models to classify cyber-attacks that mimic benign traffic. The performance of the new features is evaluated using the benchmark CICIDS2017 dataset, and the results demonstrate their validity and effectiveness. This novel proposal will improve the detection accuracy of cyber-attacks and also build towards a new direction of feature extraction for complex ones. MDPI 2021-03-04 /pmc/articles/PMC7961933/ /pubmed/33806363 http://dx.doi.org/10.3390/s21051761 Text en © 2021 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (http://creativecommons.org/licenses/by/4.0/).
spellingShingle Article
Hindy, Hanan
Atkinson, Robert
Tachtatzis, Christos
Bayne, Ethan
Bures, Miroslav
Bellekens, Xavier
Utilising Flow Aggregation to Classify Benign Imitating Attacks
title Utilising Flow Aggregation to Classify Benign Imitating Attacks
title_full Utilising Flow Aggregation to Classify Benign Imitating Attacks
title_fullStr Utilising Flow Aggregation to Classify Benign Imitating Attacks
title_full_unstemmed Utilising Flow Aggregation to Classify Benign Imitating Attacks
title_short Utilising Flow Aggregation to Classify Benign Imitating Attacks
title_sort utilising flow aggregation to classify benign imitating attacks
topic Article
url https://www.ncbi.nlm.nih.gov/pmc/articles/PMC7961933/
https://www.ncbi.nlm.nih.gov/pubmed/33806363
http://dx.doi.org/10.3390/s21051761
work_keys_str_mv AT hindyhanan utilisingflowaggregationtoclassifybenignimitatingattacks
AT atkinsonrobert utilisingflowaggregationtoclassifybenignimitatingattacks
AT tachtatzischristos utilisingflowaggregationtoclassifybenignimitatingattacks
AT bayneethan utilisingflowaggregationtoclassifybenignimitatingattacks
AT buresmiroslav utilisingflowaggregationtoclassifybenignimitatingattacks
AT bellekensxavier utilisingflowaggregationtoclassifybenignimitatingattacks