4.6 Article

Utilising Flow Aggregation to Classify Benign Imitating Attacks

Journal

SENSORS
Volume 21, Issue 5, Pages -

Publisher

MDPI
DOI: 10.3390/s21051761

Keywords

NetFlow; network traffic; intrusion detection; machine learning; features; CICIDS2017; cyber-attacks

Funding

  1. European Union [833673]

Ask authors/readers for more resources

Cyber-attacks are increasing in volume and sophistication, with advancements in computational power and human understanding contributing to their growth. By introducing new high-level abstraction features, models can better classify attacks that mimic benign traffic, improving detection accuracy.
Cyber-attacks continue to grow, both in terms of volume and sophistication. This is aided by an increase in available computational power, expanding attack surfaces, and advancements in the human understanding of how to make attacks undetectable. Unsurprisingly, machine learning is utilised to defend against these attacks. In many applications, the choice of features is more important than the choice of model. A range of studies have, with varying degrees of success, attempted to discriminate between benign traffic and well-known cyber-attacks. The features used in these studies are broadly similar and have demonstrated their effectiveness in situations where cyber-attacks do not imitate benign behaviour. To overcome this barrier, in this manuscript, we introduce new features based on a higher level of abstraction of network traffic. Specifically, we perform flow aggregation by grouping flows with similarities. This additional level of feature abstraction benefits from cumulative information, thus qualifying the models to classify cyber-attacks that mimic benign traffic. The performance of the new features is evaluated using the benchmark CICIDS2017 dataset, and the results demonstrate their validity and effectiveness. This novel proposal will improve the detection accuracy of cyber-attacks and also build towards a new direction of feature extraction for complex ones.

Authors

I am an author on this paper
Click your name to claim this paper and add it to your profile.

Reviews

Primary Rating

4.6
Not enough ratings

Secondary Ratings

Novelty
-
Significance
-
Scientific rigor
-
Rate this paper

Recommended

Article Telecommunications

LoRaWAN-implemented node localisation based on received signal strength indicator

Ibrahim Aqeel, Ephraim Iorkyase, Hussein Zangoti, Christos Tachtatzis, Robert Atkinson, Ivan Andonovic

Summary: This paper evaluates the performance of LoRaWAN Received Signal Strength Indicator (RSSI)-based node localisation in a sandstorm environment. The authors utilize machine learning algorithms to create unique signatures representing different locations. The proposed method reduces node localisation complexity and improves performance compared to GPS-based approaches.

IET WIRELESS SENSOR SYSTEMS (2023)

Article Computer Science, Artificial Intelligence

Leveraging siamese networks for one-shot intrusion detection model

Hanan Hindy, Christos Tachtatzis, Robert Atkinson, David Brosset, Miroslav Bures, Ivan Andonovic, Craig Michie, Xavier Bellekens

Summary: This paper investigates the use of supervised machine learning to enhance intrusion detection systems and proposes a complementary approach called one-shot learning, which identifies new attack classes using a limited number of examples. The experimental results confirm the adaptability of this method in handling unknown attacks and the trade-off between performance and the need for distinct class representations.

JOURNAL OF INTELLIGENT INFORMATION SYSTEMS (2023)

Review Engineering, Biomedical

A Mapping Review of Real-Time Movement Sonification Systems for Movement Rehabilitation

Thomas H. Nown, Priti Upadhyay, Andrew Kerr, Ivan Andonovic, Christos Tachtatzis, Madeleine A. Grealy

Summary: Movement sonification is a valuable tool for rehabilitation and its use is supported by increasing evidence. However, creating such a system requires consideration of unique design choices, such as the dimension of movement to sonify, the section of anatomy to track, and the methodology of motion capture. This review analyzes existing real-time movement sonification systems to identify common design choices and trends, providing an overview of the field.

IEEE REVIEWS IN BIOMEDICAL ENGINEERING (2023)

Article Chemistry, Analytical

Feed Conversion Ratio (FCR) and Performance Group Estimation Based on Predicted Feed Intake for the Optimisation of Beef Production

Chris Davison, Craig Michie, Christos Tachtatzis, Ivan Andonovic, Jenna Bowen, Carol-Anne Duthie

Summary: This study predicts the Feed Conversion Ratio (FCR) for individual animals by using estimates of individual animal feed intake made through time spent feeding measurements. Data of eating time for 80 beef animals over a 56-day period were collected to predict feed intake. A Support Vector Regression (SVR) model was trained to predict feed intake and animals were categorized into three groups based on estimated FCR values. The results demonstrate the feasibility of using "time spent eating" data to estimate feed intake and provide insights for optimizing production costs.

SENSORS (2023)

Article Energy & Fuels

PCA-Enhanced Methodology for the Identification of Partial Discharge Locations

Ephraim Tersoo Iorkyase, Christos Tachtatzis, Robert Atkinson

Summary: This paper proposes an enhanced radiolocation technique to locate partial discharge (PD) by sensing the radio frequency spectrum and extracting PD location features. A fingerprint matching algorithm and Principal Component Analysis (PCA) are used to develop a PD localization model based on extracted signal features, which improves the accuracy of PD localization.

ENERGIES (2023)

Article Environmental Sciences

SatelliteCloudGenerator: Controllable Cloud and Shadow Synthesis for Multi-Spectral Optical Satellite Images

Mikolaj Czerkawski, Robert Atkinson, Craig Michie, Christos Tachtatzis

Summary: This work proposes an open-source simulation tool that can generate a diverse and unlimited number of high-quality simulated data, which can be used to adjust cloud appearance without any annotation cost. The performance of models trained on simulated data for cloud detection and removal approaches that of models trained on real data, demonstrating the quality and utility of the generated clouds.

REMOTE SENSING (2023)

Article Computer Science, Information Systems

Intelligent Network Maintenance Modeling for Fixed Broadband Networks in Sustainable Smart Homes

Melchizedek Alipio, Miroslav Bures

Summary: This study aims to develop a predictive model using machine learning techniques to monitor and maintain FTTH networks. The results show that the K-nearest neighbors model and the feedforward artificial neural network model are the most accurate classification models, effectively identifying and addressing anomalies affecting network services.

IEEE INTERNET OF THINGS JOURNAL (2023)

Article Computer Science, Information Systems

Specialized path-based technique to test Internet of Things system functionality under limited network connectivity

Matej Klima, Miroslav Bures, Bestoun S. Ahmed, Xavier Bellekens, Robert Atkinson, Christos Tachtatzis, Pavel Herout

Summary: Contemporary IoT systems face reliability issues due to limited and unstable network connectivity. A new specialized path-based technique is proposed to test IoT processes influenced by limited network connectivity. The technique employs two coverage criteria and two algorithms to generate test cases. Compared to standard path-based testing, the proposed approach achieves higher efficiency. To obtain the best test set, a portfolio strategy combining all algorithms is recommended.

INTERNET OF THINGS (2023)

No Data Available