An Advanced Approach for Detecting Behavior-Based Intranet Attacks by Machine Learning

被引:0
|
作者
Jang, Myongwon [1 ]
Lee, Kyungho [1 ]
机构
[1] Korea Univ, Sch Cybersecur, Seoul 02841, South Korea
关键词
Cybersecurity; intranet attack; Zeek IDS; feature engineering (FE); machine learning (ML);
D O I
10.1109/ACCESS.2024.3387016
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
To address continuously increasing cyber threats, security professionals within organizations are fortifying internal security by implementing security policies such as network segregation and emerging concepts such as Zero Trust. However, despite these changes in the cybersecurity landscape, the ultimate goal of cyber attackers, which is to exfiltrate critical information stored within an organization's intranet, remains unchanged. Consequently, attackers with motives such as hacktivists persistently and repeatedly target key systems within an organization's intranet to achieve their ultimate objectives. Considering the tendencies of intranet attackers, this study proposes the inclusion of the number of connection attempts for attack detection as an additional attribute alongside commonly used attributes such as source IP, destination IP, protocol, and attack signatures in intrusion detection rules. This proposal is supported by establishing an experimental environment for conducting intranet attacks and collecting raw data. Using feature engineering techniques, the raw data were transformed into analyzable datasets, and the performance was measured using six supervised machine learning algorithms. Through this research, we aim to contribute to the field of cybersecurity by going beyond the conventional focus on Internet-based attacks and providing a methodology for analyzing various intranet-based attacks in a post-stage environment. In addition, we share the method of feature engineering Zeek IDS raw data and release the resulting dataset to further advance the field. We hope that these contributions will foster future developments in this domain.
引用
收藏
页码:52480 / 52495
页数:16
相关论文
共 50 条
  • [31] Detecting Poisoning Attacks on Machine Learning in IoT Environments
    Baracaldo, Nathalie
    Chen, Bryant
    Ludwig, Heiko
    Safavi, Amir
    Zhang, Rui
    2018 IEEE INTERNATIONAL CONGRESS ON INTERNET OF THINGS (ICIOT), 2018, : 57 - 64
  • [32] A Real Time Deep Learning Based Approach for Detecting Network Attacks
    Callegari, Christian
    Giordano, Stefano
    Pagano, Michele
    BIG DATA RESEARCH, 2024, 36
  • [33] Machine Learning Techniques for Detecting Phishing URL Attacks
    Mosa, Diana T.
    Shams, Mahmoud Y.
    Abohany, Amr A.
    El-kenawy, El-Sayed M.
    Thabet, M.
    CMC-COMPUTERS MATERIALS & CONTINUA, 2023, 75 (01): : 1271 - 1290
  • [34] Detecting Saturation Attacks in SDN via Machine Learning
    Khamaiseh, Sarver
    Serra, Edoardo
    Li, Zhiyuan
    Xu, Dianxiang
    2019 4TH INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATIONS AND SECURITY (ICCCS), 2019,
  • [35] Phishing Attacks Detection A Machine Learning-Based Approach
    Salahdine, Fatima
    El Mrabet, Zakaria
    Kaabouch, Naima
    2021 IEEE 12TH ANNUAL UBIQUITOUS COMPUTING, ELECTRONICS & MOBILE COMMUNICATION CONFERENCE (UEMCON), 2021, : 250 - 255
  • [36] A BEHAVIOR-BASED APPROACH FOR MALWARE DETECTION
    Mosli, Rayan
    Li, Rui
    Yuan, Bo
    Pan, Yin
    ADVANCES IN DIGITAL FORENSICS XIII, 2017, 511 : 187 - 201
  • [37] Replacement attacks: automatically evading behavior-based software birthmark
    Zhi Xin
    Huiyu Chen
    Xinche Wang
    Peng Liu
    Sencun Zhu
    Bing Mao
    Li Xie
    International Journal of Information Security, 2012, 11 : 293 - 304
  • [38] A Machine Learning Approach for Detecting Idiopathic REM Sleep Behavior Disorder
    Salsone, Maria
    Quattrone, Andrea
    Vescio, Basilio
    Ferini-Strambi, Luigi
    Quattrone, Aldo
    DIAGNOSTICS, 2022, 12 (11)
  • [39] BrowserGuard: A Behavior-Based Solution to Drive-by-Download Attacks
    Hsu, Fu-Hau
    Tso, Chang-Kuo
    Yeh, Yi-Chun
    Wang, Wei-Jen
    Chen, Li-Han
    IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 2011, 29 (07) : 1461 - 1468
  • [40] Detecting Advanced Attacks Based On Linux Logs
    Chen, Lin
    Xu, Aidong
    Kuang, Xiaoyun
    Lv, Huahui
    Yang, Hang
    Yang, Yiwei
    Li, Bo
    2020 IEEE 6TH INT CONFERENCE ON BIG DATA SECURITY ON CLOUD (BIGDATASECURITY) / 6TH IEEE INT CONFERENCE ON HIGH PERFORMANCE AND SMART COMPUTING, (HPSC) / 5TH IEEE INT CONFERENCE ON INTELLIGENT DATA AND SECURITY (IDS), 2020, : 60 - 64