Utilising Flow Aggregation to Classify Benign Imitating Attacks
نویسندگان
چکیده
Cyber-attacks continue to grow, both in terms of volume and sophistication. This is aided by an increase available computational power, expanding attack surfaces, advancements the human understanding how make attacks undetectable. Unsurprisingly, machine learning utilised defend against these attacks. In many applications, choice features more important than model. A range studies have, with varying degrees success, attempted discriminate between benign traffic well-known cyber-attacks. The used are broadly similar have demonstrated their effectiveness situations where cyber-attacks do not imitate behaviour. To overcome this barrier, manuscript, we introduce new based on a higher level abstraction network traffic. Specifically, perform flow aggregation grouping flows similarities. additional feature benefits from cumulative information, thus qualifying models classify that mimic performance evaluated using benchmark CICIDS2017 dataset, results demonstrate validity effectiveness. novel proposal will improve detection accuracy also build towards direction extraction for complex ones.
منابع مشابه
Utilising Oesophageal Biodegradable Stent in Benign Pyloric Stenosis: Novel Technique
Background: Benign pyloric stenosis in not uncommon problem. Different treatment modalities can be implemented each has its drawbacks. In this present a new technique of placement of biodegradable oesophageal stent for treating gastric outlet obstruction secondary to benign peptic stricture Method: 23 year old lady had long history of gastric outlet obstruction secondary to pyloric stenosis req...
متن کاملBundling Attacks in Judgment Aggregation
We consider judgment aggregation over multiple independent issues, where the chairperson has her own opinion, and can try to bias the outcome by bundling several issues together. Since for each bundle judges must give a uniform answer on all issues, different partitions of the issues may result in an outcome that significantly differs from the “true”, issue-wise, decision. We prove that the bun...
متن کاملA statistical approach to classify Skype traffic
Abstract- Skype is one of the most powerful and high-quality chat tools that allows its users to use of many services such as: transferring audio, sending messages, video conferencing and audio for free. Skype traffic has a lot of Internet traffic. Hence, Internet service providers need to identify traffic to do the quality of service and network management. On the other hand, Skype developers ...
متن کاملUsing Game Theory to Classify Wireless Ad Hoc Network Attacks with Analysis on Countermeasures
Game theory has been receiving immense concern to deal with attacks in wireless ad hoc networks, which are widely employed in a large range of applications but vulnerable to various attacks. Previous works provided readers with comprehensive understanding of game theoretic solutions on cyber security problems. However, they neglect the relationship between attack characteristics and the corresp...
متن کاملWhen Not to Classify: Anomaly Detection of Attacks (ADA) on DNN Classifiers at Test Time
A significant threat to the recent, wide deployment of machine learning-based systems, including deep neural networks (DNNs), for a host of application domains is adversarial learning (Adv-L) attacks. While attacks that corrupt training data are of concern, the main focus here is on exploits applied against (DNN-based) classifiers at test time. While much work has focused on devising attacks th...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Sensors
سال: 2021
ISSN: ['1424-8220']
DOI: https://doi.org/10.3390/s21051761