Detecting Advanced Persistent Threats using Fractal Dimension based Machine Learning Classification

被引:43
|
作者
Siddiqui, Sana [1 ]
Khan, Muhammad Salman [1 ]
Ferens, Ken [1 ]
Kinsner, Witold [1 ]
机构
[1] Univ Manitoba, Dept Elect & Comp Engn, Winnipeg, MB, Canada
关键词
Advanced Persistent Threats (APT); Remote Trojans; Machine learning; Classification; Cyber threats; Complexity; Multifractal;
D O I
10.1145/2875475.2875484
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Advanced Persistent Threats (APTs) are a new breed of internet based smart threats, which can go undetected with the existing state-of-the-art internet traffic monitoring and protection systems. With the evolution of internet and cloud computing, a new generation of smart APT attacks has also evolved and signature based threat detection systems are proving to be futile and insufficient. One of the essential strategies in detecting APTs is to continuously monitor and analyze various features of a TCP/IP connection, such as the number of transferred packets, the total count of the bytes exchanged, the duration of the TCP/IP connections, and details of the number of packet flows. The current threat detection approaches make extensive use of machine learning algorithms that utilize statistical and behavioral knowledge of the traffic. However, the performance of these algorithms is far from satisfactory in terms of reducing false negatives and false positives simultaneously. Mostly, current algorithms focus on reducing false positives, only. This paper presents a fractal based anomaly classification mechanism, with the goal of reducing both false positives and false negatives, simultaneously. A comparison of the proposed fractal based method with a traditional Euclidean based machine learning algorithm (k-NN) shows that the proposed method significantly outperforms the traditional approach by reducing false positive and false negative rates, simultaneously, while improving the overall classification rates.
引用
收藏
页码:64 / 69
页数:6
相关论文
共 50 条
  • [1] The Use of Machine Learning Algorithms for Detecting Advanced Persistent Threats
    Eke, Hope Nkiruka
    Petrovski, Andrei
    Ahriz, Hatem
    PROCEEDINGS OF THE 12TH INTERNATIONAL CONFERENCE ON SECURITY OF INFORMATION AND NETWORKS (SIN'19), 2019,
  • [2] Detecting Advanced Persistent Threats Based on Entropy and Support Vector Machine
    Tan, Jiayu
    Wang, Jian
    ALGORITHMS AND ARCHITECTURES FOR PARALLEL PROCESSING, ICA3PP 2018, PT IV, 2018, 11337 : 153 - 165
  • [3] Detection and Classification of Advanced Persistent Threats and Attacks Using the Support Vector Machine
    Chu, Wen-Lin
    Lin, Chih-Jer
    Chang, Ke-Neng
    APPLIED SCIENCES-BASEL, 2019, 9 (21):
  • [4] Machine Learning for Human-Machine Systems With Advanced Persistent Threats
    Chen, Long
    Zhang, Wei
    Song, Yanqing
    Chen, Jianguo
    IEEE TRANSACTIONS ON HUMAN-MACHINE SYSTEMS, 2024, 54 (06) : 753 - 761
  • [5] Analyzing and Detecting Advanced Persistent Threat Using Machine Learning Methodology
    Jadala, Vijaya Chandra
    Pasupuleti, Sai Kiran
    Baba, Ch M. H. Sai
    Raju, S. Hrushikesava
    Ravinder, N.
    SUSTAINABLE COMMUNICATION NETWORKS AND APPLICATION, ICSCN 2021, 2022, 93 : 497 - 506
  • [6] Detecting Advanced Persistent Threat Malware Using Machine Learning-Based Threat Hunting
    Lin, Tien-Chih
    Guo, Cheng-Chung
    Yang, Chu -Sing
    PROCEEDINGS OF THE 18TH EUROPEAN CONFERENCE ON CYBER WARFARE AND SECURITY (ECCWS 2019), 2019, : 760 - 768
  • [7] Unraveling Ransomware: Detecting Threats with Advanced Machine Learning Algorithms
    Hammadeh, Karam
    Kavitha, M.
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2023, 14 (09) : 484 - 491
  • [8] Mitigating Advanced Persistent Threats Using A Combined Static-Rule And Machine Learning-Based Technique
    Adelaiye, Oluwasegun
    Ajibola, Aminat
    2019 15TH INTERNATIONAL CONFERENCE ON ELECTRONICS, COMPUTER AND COMPUTATION (ICECCO), 2019,
  • [9] A novel approach for detecting advanced persistent threats
    Al-Saraireh, Jaafer
    Masarweh, Ala'
    EGYPTIAN INFORMATICS JOURNAL, 2022, 23 (04) : 45 - 55
  • [10] A Network Gene-Based Framework for Detecting Advanced Persistent Threats
    Wang, Yuan
    Wang, Yongjun
    Liu, Jing
    Huang, Zhijian
    2014 NINTH INTERNATIONAL CONFERENCE ON P2P, PARALLEL, GRID, CLOUD AND INTERNET COMPUTING (3PGCIC), 2014, : 97 - 102