Please use this identifier to cite or link to this item:
http://localhost:8080/xmlui/handle/123456789/1257
Title: | Improved Detection of Advanced Persistent Threats Using an Anomaly Detection Ensemble Approach |
Authors: | ADELAIYE, Oluwasegun |
Keywords: | Anomaly detection Traffic analysis Packet capture |
Issue Date: | 2021 |
Publisher: | Advances in Science, Technology and Engineering Systems (ASTES) Journal |
Citation: | 10. Adelaiye, O.I, Ajibola, A., Bisallah, H., Abiona, A.A. (2021) Improved Detection of Advanced Persistent Threats Using an Anomaly Detection Ensemble Approach. Advances in Science, Technology and Engineering Systems (ASTES) Journal. 6(2) 295-302 |
Series/Report no.: | Vol 6;No 2 |
Abstract: | Rated a high-risk cyber-attack type, Advanced Persistent Threat (APT) has become a cause for concern to cyber security experts. Detecting the presence of APT in order to mitigate this attack has been a major challenge as successful attacks to large organizations still abound. Our approach combines static rule anomaly detection through pattern recognition and machine learning-based classification technique in mitigating the APT. (1) The rules-based on patterns are derived using statistical analysis majorly Kruskal Wallis test for association. A Packet Capture (PCAP) dataset with 1,047,908 packet header data is analyzed in an attempt, to identify malicious versus normal data traffic patterns. 90% of the attack traffic utilizes unassigned and dynamic/private ports and, also data sizes of between 0 and 58 bytes. (2) The machine learning approach narrows down the algorithm utilized by evaluating the accuracy levels of four algorithms: K-Nearest Neighbor (KNN), Support Vector Machine (SVM), Decision Tree and Random Forest with the accuracies 99.74, 87.11, 99.84 and 99.90 percent respectively. A load balance approach and modified entropy formula was applied to Random Forest. The model combines the two techniques giving it a minimum accuracy of 99.95% with added capabilities of detecting false positives. The results for both methods are matched in order to make a final decision. This approach can be easily adopted, as the data required is packet header data, visible in every network and provides results with commendable levels of accuracy, and the challenges of false positives greatly reduced |
URI: | http://localhost:8080/xmlui/handle/123456789/1257 |
ISSN: | 2415-6698 |
Appears in Collections: | Research Articles |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
ASTESJ_060234.pdf | 369.94 kB | Adobe PDF | View/Open |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.