A heuristic attack detection approach using the \#x201C;least weighted \#x201D; attributes for cyber security data
Title | A heuristic attack detection approach using the \#x201C;least weighted \#x201D; attributes for cyber security data |
Publication Type | Conference Paper |
Year of Publication | 2017 |
Authors | Dali, L., Mivule, K., El-Sayed, H. |
Conference Name | 2017 Intelligent Systems Conference (IntelliSys) |
Keywords | cloud computing, cloud-based computer networks, Computational modeling, computer network security, cyber security, cyber security data, data mining, dimensional reduction, dimensionality problem, Entropy, feature extraction, feature selection, heuristic attack detection approach, Intrusion detection, learning (artificial intelligence), least weighted attributes, machine learning, machine-learning techniques, network intrusion detection, network systems, network traffic data, pattern classification, pubcrawl, Resiliency, Scalability, Security Heuristics, Support vector machines, telecommunication traffic |
Abstract | The continuous advance in recent cloud-based computer networks has generated a number of security challenges associated with intrusions in network systems. With the exponential increase in the volume of network traffic data, involvement of humans in such detection systems is time consuming and a non-trivial problem. Secondly, network traffic data tends to be highly dimensional, comprising of numerous features and attributes, making classification challenging and thus susceptible to the curse of dimensionality problem. Given such scenarios, the need arises for dimensional reduction, feature selection, combined with machine-learning techniques in the classification of such data. Therefore, as a contribution, this paper seeks to employ data mining techniques in a cloud-based environment, by selecting appropriate attributes and features with the least importance in terms of weight for the classification. Often the standard is to select features with better weights while ignoring those with least weights. In this study, we seek to find out if we can make prediction using those features with least weights. The motivation is that adversaries use stealth to hide their activities from the obvious. The question then is, can we predict any stealth activity of an adversary using the least observed attributes? In this particular study, we employ information gain to select attributes with the lowest weights and then apply machine learning to classify if a combination, in this case, of both source and destination ports are attacked or not. The motivation of this investigation is if attributes that are of least importance can be used to predict if an attack could occur. Our preliminary results show that even when the source and destination port attributes are used in combination with features with the least weights, it is possible to classify such network traffic data and predict if an attack will occur or not. |
URL | https://ieeexplore.ieee.org/document/8324260/ |
DOI | 10.1109/IntelliSys.2017.8324260 |
Citation Key | dali_heuristic_2017 |
- learning (artificial intelligence)
- telecommunication traffic
- Support vector machines
- Security Heuristics
- Scalability
- Resiliency
- pubcrawl
- pattern classification
- network traffic data
- network systems
- network intrusion detection
- machine-learning techniques
- machine learning
- least weighted attributes
- Cloud Computing
- Intrusion Detection
- heuristic attack detection approach
- Feature Selection
- feature extraction
- Entropy
- dimensionality problem
- dimensional reduction
- Data mining
- cyber security data
- cyber security
- computer network security
- Computational modeling
- cloud-based computer networks