Network Security Modelling with Distributional Data

11/24/2022
by   Subhabrata Majumdar, et al.
0

We investigate the detection of botnet command and control (C2) hosts in massive IP traffic using machine learning methods. To this end, we use NetFlow data – the industry standard for monitoring of IP traffic – and ML models using two sets of features: conventional NetFlow variables and distributional features based on NetFlow variables. In addition to using static summaries of NetFlow features, we use quantiles of their IP-level distributions as input features in predictive models to predict whether an IP belongs to known botnet families. These models are used to develop intrusion detection systems to predict traffic traces identified with malicious attacks. The results are validated by matching predictions to existing denylists of published malicious IP addresses and deep packet inspection. The usage of our proposed novel distributional features, combined with techniques that enable modelling complex input feature spaces result in highly accurate predictions by our trained models.

READ FULL TEXT

page 9

page 10

research
08/19/2021

Network Security Modeling using NetFlow Data: Detecting Botnet attacks in IP Traffic

Cybersecurity, security monitoring of malicious events in IP traffic, is...
research
10/23/2019

Intranet Security using a LAN Packet Sniffer to Monitor Traffic

This paper was designed to provide Intranet traffic monitoring by sniffi...
research
06/26/2019

Identifying DNS-tunneled traffic with predictive models

DNS is a distributed, fault tolerant system that avoids a single point o...
research
08/28/2023

Are Existing Out-Of-Distribution Techniques Suitable for Network Intrusion Detection?

Machine learning (ML) has become increasingly popular in network intrusi...
research
03/23/2023

Associated Random Neural Networks for Collective Classification of Nodes in Botnet Attacks

Botnet attacks are a major threat to networked systems because of their ...
research
07/31/2023

Learning When to Say Goodbye: What Should be the Shelf Life of an Indicator of Compromise?

Indicators of Compromise (IOCs), such as IP addresses, file hashes, and ...
research
02/06/2023

Variational Information Pursuit for Interpretable Predictions

There is a growing interest in the machine learning community in develop...

Please sign up or login with your details

Forgot password? Click here to reset