2018
DOI: 10.3390/app8112196
|View full text |Cite
|
Sign up to set email alerts
|

Analysis of Lightweight Feature Vectors for Attack Detection in Network Traffic

Abstract: The consolidation of encryption and big data in network communications have made deep packet inspection no longer feasible in large networks. Early attack detection requires feature vectors which are easy to extract, process, and analyze, allowing their generation also from encrypted traffic. So far, experts have selected features based on their intuition, previous research, or acritically assuming standards, but there is no general agreement about the features to use for attack detection in a broad scope. We … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

2
16
0

Year Published

2019
2019
2022
2022

Publication Types

Select...
4
3
1

Relationship

1
7

Authors

Journals

citations
Cited by 23 publications
(18 citation statements)
references
References 22 publications
2
16
0
Order By: Relevance
“…1.6 × 10 +1 9.1 × 10 −5 0.0 × 10 +0 0.0 × 10 +0 9.4 × 10 +2 1.6 × 10 −2 9.4 × 10 +2 1.6 × 10 −2 2.0 × 10 +0 2.9 × 10 −5 f 2-39 7.4 × 10 +1 4.2 × 10 −4 4.8 × 10 +1 6.4 × 10 −4 7.1 × 10 +1 1.2 × 10 −3 7.0 × 10 +1 1.2 × 10 −3 4.8 × 10 +1 7.0 × 10 −4 f 2- 40 3.3 × 10 +3 1.9 × 10 −2 7.7 × 10 +1 1.0 × 10 −3 1.3 × 10 +2 2.3 × 10 −3 1.2 × 10 +2 2.2 × 10 −3 7.2 × 10 +1 1.0 × 10 −3 f 2- 41 3.0 × 10 +3 1.7 × 10 −2 3.3 × 10 +2 4.5 × 10 −3 2.3 × 10 +3 3.9 × 10 −2 2.3 × 10 +3 3.9 × 10 −2 2.0 × 10 +3 3.0 × 10 −2 f 2-42 2.7 × 10 +3 1.5 × 10 −2 2.7 × 10 +3 3.7 × 10 −2 2.7 × 10 +3 4.7 × 10 −2 2.7 × 10 +3 4.7 × 10 −2 2.7 × 10 +3 4.0 × 10 −2 3.6 × 10 +4 4.0 × 10 −1 4.2 × 10 +4 4.4 × 10 −1 3.6 × 10 +4 5.5 × 10 −1 4.3 × 10 +4 7.6 × 10 −1 5.1 × 10 +4 9.1 × 10 −1 f 2-10…”
Section: Featurementioning
confidence: 99%
See 1 more Smart Citation
“…1.6 × 10 +1 9.1 × 10 −5 0.0 × 10 +0 0.0 × 10 +0 9.4 × 10 +2 1.6 × 10 −2 9.4 × 10 +2 1.6 × 10 −2 2.0 × 10 +0 2.9 × 10 −5 f 2-39 7.4 × 10 +1 4.2 × 10 −4 4.8 × 10 +1 6.4 × 10 −4 7.1 × 10 +1 1.2 × 10 −3 7.0 × 10 +1 1.2 × 10 −3 4.8 × 10 +1 7.0 × 10 −4 f 2- 40 3.3 × 10 +3 1.9 × 10 −2 7.7 × 10 +1 1.0 × 10 −3 1.3 × 10 +2 2.3 × 10 −3 1.2 × 10 +2 2.2 × 10 −3 7.2 × 10 +1 1.0 × 10 −3 f 2- 41 3.0 × 10 +3 1.7 × 10 −2 3.3 × 10 +2 4.5 × 10 −3 2.3 × 10 +3 3.9 × 10 −2 2.3 × 10 +3 3.9 × 10 −2 2.0 × 10 +3 3.0 × 10 −2 f 2-42 2.7 × 10 +3 1.5 × 10 −2 2.7 × 10 +3 3.7 × 10 −2 2.7 × 10 +3 4.7 × 10 −2 2.7 × 10 +3 4.7 × 10 −2 2.7 × 10 +3 4.0 × 10 −2 3.6 × 10 +4 4.0 × 10 −1 4.2 × 10 +4 4.4 × 10 −1 3.6 × 10 +4 5.5 × 10 −1 4.3 × 10 +4 7.6 × 10 −1 5.1 × 10 +4 9.1 × 10 −1 f 2-10…”
Section: Featurementioning
confidence: 99%
“…A correlation-based approach was implemented, to reduce the features from the datasets. Reference [40] examined the reliability of a few machine learning models, such as the RF and gradient-boosting machines in real-world IoT settings. In order to do the examination, data-poisoning attacks were simulated by using a stochastic function to modify the training data of the datasets.…”
Section: Introductionmentioning
confidence: 99%
“…For processing the data, we base our analysis on the CAIA [18] feature vector as formulated in [9], which includes the used protocol, flow duration, packet count and the total number of transmitted bytes, the minimum, maximum, mean and standard deviation of packet length and inter-arrival time and the number of packets with specific TCP flags set.…”
Section: Datasetsmentioning
confidence: 99%
“…In this paper, we train models to detect network attacks similar to the approach of a recent paper [9], which bases on the UNSW-NB15 dataset [10] and evaluates the performance of several feature vectors and ML techniques for accurate AD in the context of IDSs. We then add a backdoor to the models and show that attack detection can efficiently be bypassed if the attacker had the ability to modify training data.…”
Section: Introductionmentioning
confidence: 99%
“…Backdoor). Similarly, [25] experimented with Random forests after careful data-preprocessing using principal component analysis. Their results showcases a Precision and Recall of respectively 84.9% and 85.1%.…”
Section: Related Workmentioning
confidence: 99%