An Advanced Approach for Detecting Behavior-Based Intranet Attacks by Machine Learning

被引:0
|
作者
Jang, Myongwon [1 ]
Lee, Kyungho [1 ]
机构
[1] Korea Univ, Sch Cybersecur, Seoul 02841, South Korea
关键词
Cybersecurity; intranet attack; Zeek IDS; feature engineering (FE); machine learning (ML);
D O I
10.1109/ACCESS.2024.3387016
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
To address continuously increasing cyber threats, security professionals within organizations are fortifying internal security by implementing security policies such as network segregation and emerging concepts such as Zero Trust. However, despite these changes in the cybersecurity landscape, the ultimate goal of cyber attackers, which is to exfiltrate critical information stored within an organization's intranet, remains unchanged. Consequently, attackers with motives such as hacktivists persistently and repeatedly target key systems within an organization's intranet to achieve their ultimate objectives. Considering the tendencies of intranet attackers, this study proposes the inclusion of the number of connection attempts for attack detection as an additional attribute alongside commonly used attributes such as source IP, destination IP, protocol, and attack signatures in intrusion detection rules. This proposal is supported by establishing an experimental environment for conducting intranet attacks and collecting raw data. Using feature engineering techniques, the raw data were transformed into analyzable datasets, and the performance was measured using six supervised machine learning algorithms. Through this research, we aim to contribute to the field of cybersecurity by going beyond the conventional focus on Internet-based attacks and providing a methodology for analyzing various intranet-based attacks in a post-stage environment. In addition, we share the method of feature engineering Zeek IDS raw data and release the resulting dataset to further advance the field. We hope that these contributions will foster future developments in this domain.
引用
收藏
页码:52480 / 52495
页数:16
相关论文
共 50 条
  • [1] A Behavior-based Method for Detecting DNS Amplification Attacks
    Cai, Longzhu
    Feng, Yaokai
    Kawamoto, Junpei
    Sakurai, Kouichi
    2016 10TH INTERNATIONAL CONFERENCE ON INNOVATIVE MOBILE AND INTERNET SERVICES IN UBIQUITOUS COMPUTING (IMIS), 2016, : 608 - 613
  • [2] A Behavior-Based Online Engine for Detecting Distributed Cyber-Attacks
    Feng, Yaokai
    Hori, Yoshiaki
    Sakurai, Kouichi
    INFORMATION SECURITY APPLICATIONS, WISA 2016, 2017, 10144 : 79 - 89
  • [3] A Machine Learning Based Approach for Detecting DRDoS Attacks and Its Performance Evaluation
    Gao, Yuxuan
    Feng, Yaokai
    Kawamoto, Junpei
    Sakurai, Kouichi
    2016 11TH ASIA JOINT CONFERENCE ON INFORMATION SECURITY (ASIAJCIS), 2016, : 80 - 86
  • [4] Detecting web-based attacks by machine learning
    Cao, Lai-Cheng
    PROCEEDINGS OF 2006 INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND CYBERNETICS, VOLS 1-7, 2006, : 2737 - 2742
  • [5] A Machine Learning Approach for Detecting DoS Attacks in SDN Switches
    Abhiroop, T.
    Babu, Sarath
    Manoj, B. S.
    2018 TWENTY FOURTH NATIONAL CONFERENCE ON COMMUNICATIONS (NCC), 2018,
  • [6] A hybrid machine learning approach for detecting unprecedented DDoS attacks
    Mohammad Najafimehr
    Sajjad Zarifzadeh
    Seyedakbar Mostafavi
    The Journal of Supercomputing, 2022, 78 : 8106 - 8136
  • [7] A hybrid machine learning approach for detecting unprecedented DDoS attacks
    Najafimehr, Mohammad
    Zarifzadeh, Sajjad
    Mostafavi, Seyedakbar
    JOURNAL OF SUPERCOMPUTING, 2022, 78 (06): : 8106 - 8136
  • [8] Behavior-based approach to detect spam over IP telephony attacks
    Randa Jabeur Ben Chikha
    Tarek Abbes
    Wassim Ben Chikha
    Adel Bouhoula
    International Journal of Information Security, 2016, 15 : 131 - 143
  • [9] Behavior-based approach to detect spam over IP telephony attacks
    Ben Chikha, Randa Jabeur
    Abbes, Tarek
    Ben Chikha, Wassim
    Bouhoula, Adel
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2016, 15 (02) : 131 - 143
  • [10] Scalable Machine Learning Framework for Behavior-Based Access Control
    Cleveland, Jeffrey
    Mayhew, Michael Jay
    Adler, Aaron
    Atighetchi, Michael
    2013 6TH INTERNATIONAL SYMPOSIUM ON RESILIENT CONTROL SYSTEMS (ISRCS), 2013, : 181 - 184