Advertisement

Network Packet Breach Detection Using Cognitive Techniques

  • Priyadarsi NandaEmail author
  • Abid Arain
  • Upasana Nagar
Conference paper
  • 211 Downloads
Part of the Smart Innovation, Systems and Technologies book series (SIST, volume 141)

Abstract

Machine learning approach is being extensively used in the area of cybersecurity in recent years developing solutions to protect Internet users. The use of state-based cognitive data and the increased prevalence of data mining has allowed for the amalgamation of statistical concepts with machine learning providing real-time network packet analysis with an aim to detect when an entity has intruded the network. In this paper, the use of mean squares error for packet payload aggregation, coupled with prediction techniques using Bayes and ensemble learning outputs to data clusters provide useful and important insight to generate hybrid solutions to existing data breach problems. The use of dynamic tolerance levels and countering this against the potential for false positives is central to the design of our proposed scheme. We believe that correlations between expected information against the aggregated payloads could provide sufficient level of accuracy, which is sufficient to flag certain packets for further human assessment.

Keywords

Data breach Machine learning Cognitive Packet analysis Intrusion detection 

References

  1. 1.
    Baiocchi, A., Maiolini, G., Mingo, A., Goretti, D.: Adaptive conflict-free optimization of rule sets for network security packet filtering devices. J. Comput. Netw. Commun., 1–17 (2015)Google Scholar
  2. 2.
    Bitam, S., Zeadally, S., Mellouk, A.: Bio-inspired cybersecurity for wireless sensor networks. IEEE Commun. Mag. 54(6), 68–74 (2016)CrossRefGoogle Scholar
  3. 3.
    Buczak, A.: A survey of data mining and machine learning methods for cybersecurity intrusion detection. IEEE Commun. Surv. Tutor. 18(2), 1153–1176 (2016)CrossRefGoogle Scholar
  4. 4.
    Cerqueti, R., Falbo, P., Pelizzari, C.: Relevant states and memory in Markov chain bootstrapping and simulation. Eur. J. Oper. Res. 256(1), 163–177 (2017)MathSciNetCrossRefGoogle Scholar
  5. 5.
    Kang, M., Kang, J.: Intrusion detection system using deep neural network for in-vehicle network security. PLoS ONE 11(6), e0155781 (2016)CrossRefGoogle Scholar
  6. 6.
    Krawczyk, B., Minku, L., Gama, J., Stefanowski, J., Woźniak, M.: Ensemble learning for data stream analysis: a survey. Inf. Fusion 37, 132–156 (2017)CrossRefGoogle Scholar
  7. 7.
    Lei, J., Wang, F., Li, M., Luo, Y.: Network Computing and Information Security. Springer, Berlin (2012)Google Scholar
  8. 8.
    Manavi, M.: Defense mechanisms against distributed denial of service attacks: a survey. Comput. Electr. Eng. 72, 26–38 (2018)CrossRefGoogle Scholar
  9. 9.
    Pak, W., Choi, Y.: High performance and high scalable packet classification algorithm for network security systems. IEEE Trans. Dependable Secur. Comput. 14, 1–1Google Scholar
  10. 10.
    Parmar, H., Gosai, A.: Analysis and study of network security at transport layer. Int. J. Comput. Appl. 121(13), 35–40 (2015)Google Scholar
  11. 11.
    Simsarian, J., Kim, Y., Choi, N., Martino, C., Mohanasamy, N., Winzer, P., Thottan, M.: Error awareness in a multi-layer transport network operating system. J. Opt. Commun. Netw. 10(3), 152 (2018)CrossRefGoogle Scholar
  12. 12.
    Tsai, J.J.-P., Philip, S.Y.: Machine Learning In Cyber Trust. Springer, New York (2009) (Print)Google Scholar
  13. 13.
    Weller-Fahy, D., Borghetti, B., Sodemann, A.: A survey of distance and similarity measures used within network intrusion anomaly detection. IEEE Commun. Surv. Tutor. 17(1), 70–91 (2015)CrossRefGoogle Scholar
  14. 14.
    Yan, P., Yan, Z.: A survey on dynamic mobile malware detection. Softw. Qual. J. 26(3), 891–919 (2017)CrossRefGoogle Scholar
  15. 15.
    Yang, J., Woolbright, D.: Correlating TCP/IP Packet contexts to detect stepping-stone intrusion. Comput. Secur. 30(6–7), 538–546 (2011)CrossRefGoogle Scholar

Copyright information

© Springer Nature Singapore Pte Ltd. 2020

Authors and Affiliations

  1. 1.Faculty of Engineering and ITUniversity of Technology SydneySydneyAustralia

Personalised recommendations