Graph Machine Learning based Cyber Attack Detection for Mobile Tactical Networks

被引:0
作者
Nagaraj, Keerthiraj [1 ]
Agnew, Dennis [1 ]
Mangipudi, Pavan K. [1 ]
Starke, Allen [1 ]
Nie, Zixiang [2 ]
McNair, Janise [1 ]
机构
[1] Univ Florida, Dept Elect & Comp Engn, Gainesville, FL 32610 USA
[2] Univ S Florida, Dept Elect Elect & Commun Engn, Tampa, FL USA
来源
MILCOM 2023 - 2023 IEEE MILITARY COMMUNICATIONS CONFERENCE | 2023年
基金
美国国家科学基金会;
关键词
machine learning; cyber attacks; graph machine learning; intelligence; software-defined networking;
D O I
10.1109/MILCOM58377.2023.10356310
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
First responders and other tactical teams rely on mobile tactical networks to coordinate and accomplish emergent time-critical tasks. The information exchanged through these networks is vulnerable to various strategic cyber network attacks. Detecting and mitigating them is a challenging problem due to the volatile and mobile nature of an ad hoc environment. This paper proposes MalCAD, a graph machine learning-based framework for detecting cyber attacks in mobile tactical software-defined networks. MalCAD operates based on observing connectivity features among various nodes obtained using graph theory, instead of collecting information at each node. The MalCAD framework is based on the XGBOOST classification algorithm and is evaluated for lost versus wasted connectivity and random versus targeted cyber attacks. Results show that, while the initial cyber attacks create a loss of 30%-60% throughput, MalCAD results in a gain of average throughput by 25%-50%, demonstrating successful attack mitigation.
引用
收藏
页数:6
相关论文
共 29 条
  • [1] Abdel-Fattah F, 2019, 2019 IEEE JORDAN INTERNATIONAL JOINT CONFERENCE ON ELECTRICAL ENGINEERING AND INFORMATION TECHNOLOGY (JEEIT), P28, DOI 10.1109/JEEIT.2019.8717449
  • [2] Implementation Aspects of Smart Grids Cyber-Security Cross-Layered Framework for Critical Infrastructure Operation
    Agnew, Dennis
    Aljohani, Nader
    Mathieu, Reynold
    Boamah, Sharon
    Nagaraj, Keerthiraj
    McNair, Janise
    Bretas, Arturo
    [J]. APPLIED SCIENCES-BASEL, 2022, 12 (14):
  • [3] Aparicio-Navarro FJ, 2019, CONF INNOV CLOUD, P188, DOI 10.1109/ICIN.2019.8685841
  • [4] Cross-Stack Threat Sensing for Cyber Security and Resilience
    Araujo, Frederico
    Taylor, Teryl
    Zhang, Jialong
    Stoecklin, Marc
    [J]. 2018 48TH ANNUAL IEEE/IFIP INTERNATIONAL CONFERENCE ON DEPENDABLE SYSTEMS AND NETWORKS WORKSHOPS (DSN-W), 2018, : 18 - 21
  • [5] Transforming an Adjacency Graph into Dimensioned Floorplan Layouts
    Bisht, Sumit
    Shekhawat, Krishnendra
    Upasani, Nitant
    Jain, Rahil N.
    Tiwaskar, Riddhesh Jayesh
    Hebbar, Chinmay
    [J]. COMPUTER GRAPHICS FORUM, 2022, 41 (06) : 5 - 22
  • [6] Bisong E., 2019, Building Machine Learning and Deep Learning Models on Google Cloud Platform: A Comprehensive Guide for Beginners, P215, DOI 10.1007/978-1-4842-4470-8_18
  • [7] Charbuty B, 2021, Journal of Applied Science and Technology Trends, V2, P20, DOI [DOI 10.38094/JASTT20165, 10.38094/jastt20165]
  • [8] XGBoost: A Scalable Tree Boosting System
    Chen, Tianqi
    Guestrin, Carlos
    [J]. KDD'16: PROCEEDINGS OF THE 22ND ACM SIGKDD INTERNATIONAL CONFERENCE ON KNOWLEDGE DISCOVERY AND DATA MINING, 2016, : 785 - 794
  • [9] Dasari M, 2017, CONSUM COMM NETWORK, P939, DOI 10.1109/CCNC.2017.7983259
  • [10] Dorge PD, 2018, 2018 FIRST INTERNATIONAL CONFERENCE ON SECURE CYBER COMPUTING AND COMMUNICATIONS (ICSCCC 2018), P51, DOI 10.1109/ICSCCC.2018.8703317