Heuristic Intrusion Detection Based on Traffic Flow Statistical Analysis

被引:4
|
作者
Szczepanik, Wojciech [1 ]
Niemiec, Marcin [1 ]
机构
[1] AGH Univ Sci & Technol, Dept Telecommun, Mickiewicza 30, PL-30059 Krakow, Poland
基金
欧盟地平线“2020”;
关键词
cybersecurity; intrusion detection; network attacks; machine learning; artificial neural networks; smart grids; CYBER-ATTACK DETECTION; DEEP;
D O I
10.3390/en15113951
中图分类号
TE [石油、天然气工业]; TK [能源与动力工程];
学科分类号
0807 ; 0820 ;
摘要
As telecommunications are becoming increasingly important for modern systems, ensuring secure data transmission is getting more and more critical. Specialised numerous devices that form smart grids are a potential attack vector and therefore is a challenge for cybersecurity. It requires the continuous development of methods to counteract this risk. This paper presents a heuristic approach to detecting threats in network traffic using statistical analysis of packet flows. The important advantage of this method is ability of intrusion detection also in encrypted transmissions. Flow information is processing by neural networks to detect malicious traffic. The architectures of subsequent versions of the artificial neural networks were generated based on the results obtained by previous iterations by searching the hyperparameter space, resulting in more refined models. Finally, the networks prepared in this way exhibited high performance while maintaining a small size-thereby making them an effective method of attacks detection in network environment to protect smart grids.
引用
收藏
页数:19
相关论文
共 50 条
  • [11] Analysis of Heuristic based Feature Reduction method in Intrusion Detection System.
    Umbarkar, Swapnil
    Shukla, Sanyam
    2018 5TH INTERNATIONAL CONFERENCE ON SIGNAL PROCESSING AND INTEGRATED NETWORKS (SPIN), 2018, : 717 - 720
  • [12] Statistical Analysis on Aggregate and Flow Based Traffic Features Distribution
    Purwanto, Yudha
    Kuspriyanto
    Hendrawan
    Rahardjo, Budi
    PROCEEDING OF 2015 1ST INTERNATIONAL CONFERENCE ON WIRELESS AND TELEMATICS (ICWT), 2015,
  • [13] Flow-based Features for a Robust Intrusion Detection System Targeting Mobile Traffic
    Elrawy, Mohammed Faisal
    Awad, Ali Ismail
    Hamed, Hesham F. A.
    2016 23RD INTERNATIONAL CONFERENCE ON TELECOMMUNICATIONS (ICT), 2016,
  • [14] Payload-Based Network Traffic Analysis for Application Classification and Intrusion Detection
    Ozdel, Suleyman
    Ates, Cagatay
    Ates, Pelin Damla
    Koca, Mutlu
    Anarim, Emin
    2022 30TH EUROPEAN SIGNAL PROCESSING CONFERENCE (EUSIPCO 2022), 2022, : 638 - 642
  • [15] Research on Intrusion Detection Based on Heuristic Genetic Neural Network
    Zhang, Biying
    ADVANCES IN ELECTRONIC COMMERCE, WEB APPLICATION AND COMMUNICATION, VOL 2, 2012, 149 : 567 - 573
  • [16] Statistical Analysis of False Positives and False Negatives from Real Traffic with Intrusion Detection/Prevention Systems
    Ho, Cheng-Yuan
    Lai, Yuan-Cheng
    Chen, I-Wei
    Wang, Fu-Yu
    Tai, Wei-Hsuan
    IEEE COMMUNICATIONS MAGAZINE, 2012, 50 (03) : 146 - 154
  • [17] IoT Wireless Intrusion Detection and Network Traffic Analysis
    Ponnusamy V.
    Yichiet A.
    Jhanjhi N.Z.
    Humayun M.
    Almufareh M.F.
    Computer Systems Science and Engineering, 2021, 40 (03): : 865 - 879
  • [18] IoT Wireless Intrusion Detection and Network Traffic Analysis
    Ponnusamy, Vasaki
    Yichiet, Aun
    Jhanjhi, N. Z.
    Humayun, Mamoona
    Almufareh, Maram Fahhad
    COMPUTER SYSTEMS SCIENCE AND ENGINEERING, 2022, 40 (03): : 865 - 879
  • [19] Taxonomy of statistical based anomaly detection techniques for intrusion detection
    Qayyum, A
    Islam, MH
    Jamil, M
    IEEE: 2005 International Conference on Emerging Technologies, Proceedings, 2005, : 270 - 276
  • [20] Multivariate statistical analysis of audit trails for host-based intrusion detection
    Ye, N
    Emran, SM
    Chen, Q
    Vilbert, S
    IEEE TRANSACTIONS ON COMPUTERS, 2002, 51 (07) : 810 - 820