Anomaly Detection Module for Network Traffic Monitoring in Public Institutions

Author:

Wawrowski Łukasz1ORCID,Białas Andrzej1ORCID,Kajzer Adrian2,Kozłowski Artur1ORCID,Kurianowicz Rafał1,Sikora Marek13ORCID,Szymańska-Kwiecień Agnieszka2ORCID,Uchroński Mariusz2ORCID,Białczak Miłosz2,Olejnik Maciej2,Michalak Marcin13ORCID

Affiliation:

1. Łukasiewicz Research Network—Institute of Innovative Technologies EMAG, ul. Leopolda 31, 40-189 Katowice, Poland

2. Wroclaw Centre for Networking and Supercomputing, Wroclaw University of Science and Technology, Wybrzeże Wyspiańskiego 27, 50-370 Wrocław, Poland

3. Department of Computer Networks and Systems, Silesian University of Technology, ul. Akademicka 16, 44-100 Gliwice, Poland

Abstract

It seems to be a truism to say that we should pay more and more attention to network traffic safety. Such a goal may be achieved with many different approaches. In this paper, we put our attention on the increase in network traffic safety based on the continuous monitoring of network traffic statistics and detecting possible anomalies in the network traffic description. The developed solution, called the anomaly detection module, is mostly dedicated to public institutions as the additional component of the network security services. Despite the use of well-known anomaly detection methods, the novelty of the module is based on providing an exhaustive strategy of selecting the best combination of models as well as tuning the models in a much faster offline mode. It is worth emphasizing that combined models were able to achieve 100% balanced accuracy level of specific attack detection.

Funder

the statutory research project of ITI EMAG

the Wroclaw Centre for Networking and Supercomputing, Wroclaw University of Science and Technology, Wroclaw, Poland

Publisher

MDPI AG

Subject

Electrical and Electronic Engineering,Biochemistry,Instrumentation,Atomic and Molecular Physics, and Optics,Analytical Chemistry

Reference74 articles.

1. Zimmerman, Z. (2014). Ten Strategies of a World–Class Cybersecurity Operations Center, The MITRE Corp.

2. Muniz, J., McIntyre, G., and AlFardan, N. (2016). Security Operations Center: Building, Operating, and Maintaining Your SOC, Cisco Press.

3. (2023, January 15). Snort IDS. Available online: www.snort.org.

4. Evaluating protection motivation based cybersecurity awareness training on Kirkpatrick’s Model;Khan;Comput. Secur.,2023

5. A review of Machine Learning-based zero-day attack detection: Challenges and future directions;Guo;Comput. Commun.,2023

Cited by 4 articles. 订阅此论文施引文献 订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献

同舟云学术

1.学者识别学者识别

2.学术分析学术分析

3.人才评估人才评估

"同舟云学术"是以全球学者为主线,采集、加工和组织学术论文而形成的新型学术文献查询和分析系统,可以对全球学者进行文献检索和人才价值评估。用户可以通过关注某些学科领域的顶尖人物而持续追踪该领域的学科进展和研究前沿。经过近期的数据扩容,当前同舟云学术共收录了国内外主流学术期刊6万余种,收集的期刊论文及会议论文总量共计约1.5亿篇,并以每天添加12000余篇中外论文的速度递增。我们也可以为用户提供个性化、定制化的学者数据。欢迎来电咨询!咨询电话:010-8811{复制后删除}0370

www.globalauthorid.com

TOP

Copyright © 2019-2024 北京同舟云网络信息技术有限公司
京公网安备11010802033243号  京ICP备18003416号-3