Unveiling Malicious Network Flows Using Benford's Law

被引:0
作者
Fernandes, Pedro [1 ]
Ciardhuain, Seamus o [1 ]
Antunes, Mario [2 ,3 ]
机构
[1] Technol Univ Shannon, Dept Informat Technol, Moylish Campus,Moylish Pk, Limerick V94 EC5T, Ireland
[2] Polytech Univ Leiria, Sch Technol & Management, P-2411901 Leiria, Portugal
[3] CRACS, INESC TEC, P-4200465 Porto, Portugal
关键词
flow analysis; Benford's Law; network traffic; Kullback-Leibler divergence; mean absolute deviation; statistical analysis; 68-11; 62-11; ANOMALY DETECTION; ATTACKS; SYSTEMS;
D O I
10.3390/math12152299
中图分类号
O1 [数学];
学科分类号
0701 ; 070101 ;
摘要
The increasing proliferation of cyber-attacks threatening the security of computer networks has driven the development of more effective methods for identifying malicious network flows. The inclusion of statistical laws, such as Benford's Law, and distance functions, applied to the first digits of network flow metadata, such as IP addresses or packet sizes, facilitates the detection of abnormal patterns in the digits. These techniques also allow for quantifying discrepancies between expected and suspicious flows, significantly enhancing the accuracy and speed of threat detection. This paper introduces a novel method for identifying and analyzing anomalies within computer networks. It integrates Benford's Law into the analysis process and incorporates a range of distance functions, namely the Mean Absolute Deviation (MAD), the Kolmogorov-Smirnov test (KS), and the Kullback-Leibler divergence (KL), which serve as dispersion measures for quantifying the extent of anomalies detected in network flows. Benford's Law is recognized for its effectiveness in identifying anomalous patterns, especially in detecting irregularities in the first digit of the data. In addition, Bayes' Theorem was implemented in conjunction with the distance functions to enhance the detection of malicious traffic flows. Bayes' Theorem provides a probabilistic perspective on whether a traffic flow is malicious or benign. This approach is characterized by its flexibility in incorporating new evidence, allowing the model to adapt to emerging malicious behavior patterns as they arise. Meanwhile, the distance functions offer a quantitative assessment, measuring specific differences between traffic flows, such as frequency, packet size, time between packets, and other relevant metadata. Integrating these techniques has increased the model's sensitivity in detecting malicious flows, reducing the number of false positives and negatives, and enhancing the resolution and effectiveness of traffic analysis. Furthermore, these techniques expedite decisions regarding the nature of traffic flows based on a solid statistical foundation and provide a better understanding of the characteristics that define these flows, contributing to the comprehension of attack vectors and aiding in preventing future intrusions. The effectiveness and applicability of this joint method have been demonstrated through experiments with the CICIDS2017 public dataset, which was explicitly designed to simulate real scenarios and provide valuable information to security professionals when analyzing computer networks. The proposed methodology opens up new perspectives in investigating and detecting anomalies and intrusions in computer networks, which are often attributed to cyber-attacks. This development culminates in creating a promising model that stands out for its effectiveness and speed, accurately identifying possible intrusions with an F1 of nearly 80%, a recall of 99.42%, and an accuracy of 65.84%.
引用
收藏
页数:37
相关论文
共 54 条
[1]   A survey of network anomaly detection techniques [J].
Ahmed, Mohiuddin ;
Mahmood, Abdun Naser ;
Hu, Jiankun .
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2016, 60 :19-31
[2]   Intrusion Detection Systems, Issues, Challenges, and Needs [J].
Aljanabi, Mohammad ;
Ismail, Mohd Arfian ;
Ali, Ahmed Hussein .
INTERNATIONAL JOURNAL OF COMPUTATIONAL INTELLIGENCE SYSTEMS, 2021, 14 (01) :560-571
[3]   DISTRIBUTIONAL DISCRIMINATION USING KOLMOGOROV-SMIRNOV STATISTICS AND KULLBACK-LEIBLER DIVERGENCE FOR GAMMA, LOG-NORMAL, AND WEIBULL DISTRIBUTIONS [J].
Andriulli, Mario ;
Starling, James K. ;
Schwartz, Blake .
2022 WINTER SIMULATION CONFERENCE (WSC), 2022, :2330-2341
[4]  
[Anonymous], 1999, Technical Report
[5]   Benford's law behavior of Internet traffic [J].
Arshadi, Laleh ;
Jahangir, Amir Hossein .
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2014, 40 :194-205
[6]   The mathematics of Benford's law: a primer [J].
Berger, Arno ;
Hill, Theodore P. .
STATISTICAL METHODS AND APPLICATIONS, 2021, 30 (03) :779-795
[7]  
Borenstein M., 2009, INTRO METAANALYSIS, DOI [10.1002/9780470743386, DOI 10.1002/9780470743386]
[8]   Detecting network cyber-attacks using an integrated statistical approach [J].
Bouyeddou, Benamar ;
Harrou, Fouzi ;
Kadri, Benamar ;
Sun, Ying .
CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2021, 24 (02) :1435-1453
[9]  
Bouyeddou B, 2018, 2018 4TH INTERNATIONAL CONFERENCE ON COMPUTER AND TECHNOLOGY APPLICATIONS (ICCTA), P11, DOI 10.1109/CATA.2018.8398647
[10]   Statistical Estimation of the Kullback-Leibler Divergence [J].
Bulinski, Alexander ;
Dimitrov, Denis .
MATHEMATICS, 2021, 9 (05) :1-36