An autoML network traffic analyzer for cyber threat detection

被引:4
作者
Papanikolaou, Alexandros [1 ]
Alevizopoulos, Aggelos [1 ]
Ilioudis, Christos [2 ]
Demertzis, Konstantinos [3 ]
Rantos, Konstantinos [3 ]
机构
[1] Innovat Secure Technol PC, Thermi, Greece
[2] Int Hellen Univ, Dept Informat & Elect Engn, Thermi, Greece
[3] Int Hellen Univ, Dept Comp Sci, Kavala, Greece
关键词
Cyber threat intelligent; Cyber threat information; Information sharing; Industrial environment; Cybersecurity; OPTIMIZATION; ATTACKS; MODEL;
D O I
10.1007/s10207-023-00703-0
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Timely detection and effective treatment of cyber-attacks for protecting personal and sensitive data from unauthorized disclosure constitute a core demand of citizens and a legal obligation of organizations that collect and process personal data. SMEs and organizations understand their obligation to comply with GDPR and protect the personal data they have in their possession. They invest in advanced and intelligent solutions to increase their cybersecurity posture. This article introduces a ground-breaking Network Traffic Analyzer, a crucial component of the Cyber-pi project's cyber threat intelligent information sharing architecture (CTI2SA). The suggested system, built on the Lambda (lambda) architecture, enhances active cybersecurity approaches for traffic analysis by combining batch and stream processing to handle massive amounts of data. The Network Traffic Analyzer's core module has an automatic model selection mechanism that selects the ML model with the highest performance among its rivals. The goal is to keep the architecture's overall threat identification capabilities functioning effectively.
引用
收藏
页码:1511 / 1530
页数:20
相关论文
共 105 条
  • [1] A Survey of Cyber-Physical Attacks and Detection Methods in Smart Water Distribution Systems
    Addeen, Hajar Hameed
    Xiao, Yang
    Li, Jiacheng
    Guizani, Mohsen
    [J]. IEEE ACCESS, 2021, 9 : 99905 - 99921
  • [2] Akram B., 2020, 2020 INT C ICT SMART, P1
  • [3] Al Enany Marwa O., 2021, 2021 International Conference on Electronic Engineering (ICEEM), DOI 10.1109/ICEEM52022.2021.9480384
  • [4] Internet of Things: A Survey on Enabling Technologies, Protocols, and Applications
    Al-Fuqaha, Ala
    Guizani, Mohsen
    Mohammadi, Mehdi
    Aledhari, Mohammed
    Ayyash, Moussa
    [J]. IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2015, 17 (04): : 2347 - 2376
  • [5] Alghamdi Rubayyi, 2021, 2021 4th International Conference on Artificial Intelligence and Big Data (ICAIBD), P561, DOI 10.1109/ICAIBD51990.2021.9458974
  • [6] Alhasan Seiba, 2021, 2021 International Conference on Cyber Security and Internet of Things (ICSIoT), P7, DOI 10.1109/ICSIoT55070.2021.00011
  • [7] Ali Rao Faizan, 2021, 2021 International Conference on Data Analytics for Business and Industry (ICDABI), P630, DOI 10.1109/ICDABI53623.2021.9655902
  • [8] [Anonymous], INTRO STIX
  • [9] [Anonymous], MISP OPEN SOURCE THR
  • [10] [Anonymous], OSSEC WORLDS MOST WI