An Advanced Approach for Detecting Behavior-Based Intranet Attacks by Machine Learning

被引:0
|
作者
Jang, Myongwon [1 ]
Lee, Kyungho [1 ]
机构
[1] Korea Univ, Sch Cybersecur, Seoul 02841, South Korea
关键词
Cybersecurity; intranet attack; Zeek IDS; feature engineering (FE); machine learning (ML);
D O I
10.1109/ACCESS.2024.3387016
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
To address continuously increasing cyber threats, security professionals within organizations are fortifying internal security by implementing security policies such as network segregation and emerging concepts such as Zero Trust. However, despite these changes in the cybersecurity landscape, the ultimate goal of cyber attackers, which is to exfiltrate critical information stored within an organization's intranet, remains unchanged. Consequently, attackers with motives such as hacktivists persistently and repeatedly target key systems within an organization's intranet to achieve their ultimate objectives. Considering the tendencies of intranet attackers, this study proposes the inclusion of the number of connection attempts for attack detection as an additional attribute alongside commonly used attributes such as source IP, destination IP, protocol, and attack signatures in intrusion detection rules. This proposal is supported by establishing an experimental environment for conducting intranet attacks and collecting raw data. Using feature engineering techniques, the raw data were transformed into analyzable datasets, and the performance was measured using six supervised machine learning algorithms. Through this research, we aim to contribute to the field of cybersecurity by going beyond the conventional focus on Internet-based attacks and providing a methodology for analyzing various intranet-based attacks in a post-stage environment. In addition, we share the method of feature engineering Zeek IDS raw data and release the resulting dataset to further advance the field. We hope that these contributions will foster future developments in this domain.
引用
收藏
页码:52480 / 52495
页数:16
相关论文
共 50 条
  • [41] Replacement attacks: automatically evading behavior-based software birthmark
    Xin, Zhi
    Chen, Huiyu
    Wang, Xinche
    Liu, Peng
    Zhu, Sencun
    Mao, Bing
    Xie, Li
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2012, 11 (05) : 293 - 304
  • [42] Behavior-Based Machine Learning Approaches to Identify State-Sponsored Trolls on Twitter
    Alhazbi, Saleh
    IEEE ACCESS, 2020, 8 : 195132 - 195141
  • [43] Enhancing V2G Network Security: A Novel Cockroach Behavior-Based Machine Learning Classifier to Mitigate MitM and DoS Attacks
    Mekkaoui, Kheireddine
    ADVANCES IN ELECTRICAL AND COMPUTER ENGINEERING, 2024, 24 (02) : 31 - 40
  • [44] Detecting block ciphers generic attacks: An instance-based machine learning method
    Alsariera, Yazan Ahmad
    INTERNATIONAL JOURNAL OF ADVANCED AND APPLIED SCIENCES, 2022, 9 (05): : 60 - 68
  • [45] Machine learning based intrusion detection framework for detecting security attacks in internet of things
    Kantharaju, V.
    Suresh, H.
    Niranjanamurthy, M.
    Ansarullah, Syed Immamul
    Amin, Farhan
    Alabrah, Amerah
    SCIENTIFIC REPORTS, 2024, 14 (01):
  • [46] Feature Engineering and Machine Learning Pipeline for Detecting Radio Protocol-based Attacks
    Muhammad, Auwn
    Abdelrazek, Loay
    Ullah, Ikram
    2023 IEEE WIRELESS COMMUNICATIONS AND NETWORKING CONFERENCE, WCNC, 2023,
  • [47] Detecting Web-Based Attacks with SHAP and Tree Ensemble Machine Learning Methods
    Ndichu, Samuel
    Kim, Sangwook
    Ozawa, Seiichi
    Ban, Tao
    Takahashi, Takeshi
    Inoue, Daisuke
    APPLIED SCIENCES-BASEL, 2022, 12 (01):
  • [48] A machine learning-based intrusion detection for detecting internet of things network attacks
    Saheed, Yakub Kayode
    Abiodun, Aremu Idris
    Misra, Sanjay
    Holone, Monica Kristiansen
    Colomo-Palacios, Ricardo
    ALEXANDRIA ENGINEERING JOURNAL, 2022, 61 (12) : 9395 - 9409
  • [49] A Parameterless Learning Algorithm for Behavior-based Detection
    Wang, Can
    Feng, Yaokai
    Kawamoto, Junpei
    Hori, Yoshiaki
    Sakurai, Kouichi
    2014 NINTH ASIA JOINT CONFERENCE ON INFORMATION SECURITY (ASIA JCIS), 2014, : 11 - 18
  • [50] Continual Learning for Behavior-based Driver Identification
    Fanan, Mattia
    Dalle Pezze, Davide
    Efatinasab, Emad
    Carli, Ruggero
    Rampazzo, Mirco
    Susto, Gian Antonio
    Engineering Applications of Artificial Intelligence, 2025, 150