Rapid Cyber-Attack Detection System with Low Probability of Missed Attack Warnings

被引:0
|
作者
Vidanapathirana, Dushani [1 ]
Mohammad, Azeem [1 ]
Halgamuge, Malka N. [2 ]
机构
[1] Charles Sturt Univ, Sch Comp & Math, Melbourne, Vic 3000, Australia
[2] RMIT Univ, Dept Informat Syst & Business Analyt, Melbourne, Vic 3000, Australia
关键词
Cyber security; cyberattack detection; missed attack warnings; false negative rate (FNR);
D O I
10.1109/ICIEA54703.2022.10006262
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
We develop a rapid cyberattack detection system with a low probability of missed warnings and a reduced number of features that decreases the complexity of a classification model. Firstly, we adopt four feature selection methods separately to extract features: Boruta algorithm, Extreme Gradient Boosting (XGB) algorithm, network security expertise knowledge and multiple feature selection methods combining XGB and Pearson's Correlation Coefficient test. Secondly, we create classification models under each feature selection strategy using Random Forest, Ctree and XGB algorithms for all four different feature selection strategies. Thirdly, to train the 12 classification models, we use a network traffic dataset (UNSW-NB15, N= 257,673) with nine types of cyberattacks. Finally, the model performances are evaluated using features count, accuracy, sensitivity, specificity, False Negative Rate (FNR) and responding time (prediction time or computation time). We identify the random forest model, which is filtered through the feature selection strategy of XGB and Pearson's correlation coefficient test, as the best model. It has the minimum features count (seven), 94.37% accuracy, 3.68% FNR and 1.94 sec responding time. The proposed model has higher performance compared to nine previous studies. Our proposed predictive model with the least number of features provides higher attack detection accuracy and lesser FNR within minimum responding time.
引用
收藏
页码:1423 / 1429
页数:7
相关论文
共 50 条
  • [1] Controller Cyber-Attack Detection and Isolation
    Sztyber-Betley, Anna
    Syfert, Michal
    Koscielny, Jan Maciej
    Gorecka, Zuzanna
    [J]. SENSORS, 2023, 23 (05)
  • [2] Adaptive cyber-attack modeling system
    Gonsalves, Paul G.
    Dougherty, Edward T.
    [J]. SENSORS, AND COMMAND, CONTROL, COMMUNICATIONS, AND INTELLIGENCE (C31)TECHNOLOGIES FOR HOMELAND SECURITY AND HOMELAND DEFENSE V, 2006, 6201
  • [3] Cyber-Attack Attributes
    Kadivar, Mehdi
    [J]. TECHNOLOGY INNOVATION MANAGEMENT REVIEW, 2014, : 22 - 27
  • [4] Ensemble Learning Methods for Power System Cyber-Attack Detection
    Chen, Xiayang
    Zhang, Lei
    Liu, Yi
    Tang, Chaojing
    [J]. 2018 IEEE 3RD INTERNATIONAL CONFERENCE ON CLOUD COMPUTING AND BIG DATA ANALYSIS (ICCCBDA), 2018, : 613 - 616
  • [5] The Law of Cyber-Attack
    Hathaway, Oona A.
    Crootof, Rebecca
    Levitz, Philip
    Nix, Haley
    Nowlan, Aileen
    Perdue, William
    Spiegel, Julia
    [J]. CALIFORNIA LAW REVIEW, 2012, 100 (04) : 817 - 885
  • [6] Cyber-attack Detection in the Networked Control System with Faulty Plant
    Yaseen, Amer Atta
    Bayart, Mireille
    [J]. 2017 25TH MEDITERRANEAN CONFERENCE ON CONTROL AND AUTOMATION (MED), 2017, : 980 - 985
  • [7] Cyber-attack group analysis method based on association of cyber-attack information
    Son, Kyung-ho
    Kim, Byung-ik
    Lee, Tae-jin
    [J]. KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2020, 14 (01): : 260 - 280
  • [8] Data Mining Based Cyber-Attack Detection
    TIANFIELD Huaglory
    [J]. 系统仿真技术, 2017, 13 (02) : 90 - 104
  • [9] Cyber-attack risk low for medical devices
    Tse, Zion Tsz Ho
    Xu, Sheng
    Fung, Isaac Chun-Hai
    Wood, Bradford J.
    [J]. SCIENCE, 2015, 347 (6228) : 1323 - 1324
  • [10] Cyber-Attack Detection for Automotive Cyber-Physical Systems
    Lee, Suyun
    Jung, Sunjae
    Baek, Youngmi
    [J]. BUILDSYS'21: PROCEEDINGS OF THE 2021 ACM INTERNATIONAL CONFERENCE ON SYSTEMS FOR ENERGY-EFFICIENT BUILT ENVIRONMENTS, 2021, : 214 - 215