An autoML network traffic analyzer for cyber threat detection

被引:0
|
作者
Alexandros Papanikolaou
Aggelos Alevizopoulos
Christos Ilioudis
Konstantinos Demertzis
Konstantinos Rantos
机构
[1] Innovative Secure Technologies P.C.,Department of Information and Electronic Engineering
[2] International Hellenic University,Department of Computer Science
[3] International Hellenic University,undefined
关键词
Cyber threat intelligent; Cyber threat information; Information sharing; Industrial environment; Cybersecurity;
D O I
暂无
中图分类号
学科分类号
摘要
Timely detection and effective treatment of cyber-attacks for protecting personal and sensitive data from unauthorized disclosure constitute a core demand of citizens and a legal obligation of organizations that collect and process personal data. SMEs and organizations understand their obligation to comply with GDPR and protect the personal data they have in their possession. They invest in advanced and intelligent solutions to increase their cybersecurity posture. This article introduces a ground-breaking Network Traffic Analyzer, a crucial component of the Cyber-pi project's cyber threat intelligent information sharing architecture (CTI2SA). The suggested system, built on the Lambda (λ) architecture, enhances active cybersecurity approaches for traffic analysis by combining batch and stream processing to handle massive amounts of data. The Network Traffic Analyzer's core module has an automatic model selection mechanism that selects the ML model with the highest performance among its rivals. The goal is to keep the architecture's overall threat identification capabilities functioning effectively.
引用
收藏
页码:1511 / 1530
页数:19
相关论文
共 50 条
  • [41] Network traffic analysis from the Cyber Defense Exercise
    Dodge, RC
    Wilson, T
    2003 IEEE INTERNATIONAL CONFERENCE ON SYSTEMS, MAN AND CYBERNETICS, VOLS 1-5, CONFERENCE PROCEEDINGS, 2003, : 4317 - 4321
  • [42] Network Web Traffic Generator for Cyber Range Exercises
    Javali, Chitra
    Revadigar, Girish
    PROCEEDINGS OF THE IEEE LCN: 2019 44TH ANNUAL IEEE CONFERENCE ON LOCAL COMPUTER NETWORKS (LCN 2019), 2019, : 308 - 315
  • [43] A Design of IL-CyTIS for Automated Cyber Threat Detection
    Yoo, Joseph
    An, Jung Hyun
    Kim, Keecheon
    2018 32ND INTERNATIONAL CONFERENCE ON INFORMATION NETWORKING (ICOIN), 2018, : 689 - 693
  • [44] WirelessHART network analyzer with coexistence detection
    Machado, Tatiane
    Muller, Ivan
    Winter, Jean
    Dickow, Victor
    Pereira, Carlos E.
    Netto, Joao C.
    2014 12TH IEEE INTERNATIONAL CONFERENCE ON INDUSTRIAL INFORMATICS (INDIN), 2014, : 696 - +
  • [45] A Model of APT Attack Defense Based on Cyber Threat Detection
    Li, Yue
    Zhang, Teng
    Li, Xue
    Li, Ting
    CYBER SECURITY, CNCERT 2018, 2019, 970 : 122 - 135
  • [46] Evaluating Network Cyber Resiliency Methods using Cyber Threat, Vulnerability and Defense Modeling and Simulation
    Hassell, Suzanne
    Beraud, Paul
    Cruz, Alen
    Ganga, Gangadhar
    Martin, Steve
    Toennies, Justin
    Vazquez, Pablo
    Wright, Gary
    Gomez, Daniel
    Pietryka, Frank
    Srivastava, Niraj
    Hester, Travis
    Hyde, David
    Mastropietro, Brian
    2012 IEEE MILITARY COMMUNICATIONS CONFERENCE (MILCOM 2012), 2012,
  • [47] PANACEA: a neural model ensemble for cyber-threat detection
    AL-Essa, Malik
    Andresini, Giuseppina
    Appice, Annalisa
    Malerba, Donato
    MACHINE LEARNING, 2024, 113 (08) : 5379 - 5422
  • [48] ChainSpot: Mining Service Logs for Cyber Security Threat Detection
    Wu, Jain-Shing
    Lee, Yuh-Jye
    Wei, Te-En
    Hsieh, Chih-Hung
    Lai, Chia-Min
    2016 IEEE TRUSTCOM/BIGDATASE/ISPA, 2016, : 1867 - 1874
  • [49] Deep learning for cyber threat detection in IoT networks: A review
    Aldhaheri A.
    Alwahedi F.
    Ferrag M.A.
    Battah A.
    Internet of Things and Cyber-Physical Systems, 2024, 4 : 110 - 128
  • [50] Cyber Threat Landscape in Cyber Space
    Shanker, Anusha Kadambari
    Usha, G.
    2017 INTERNATIONAL CONFERENCE OF ELECTRONICS, COMMUNICATION AND AEROSPACE TECHNOLOGY (ICECA), VOL 1, 2017, : 375 - 380