A Cyberattacks Detection Technique Based on Evolutionary Algorithms

被引:0
作者
Lysenko, Sergii [1 ]
Bobrovnikova, Kira [1 ]
Shchuka, Roman [1 ]
Savenko, Oleg [1 ]
机构
[1] Khmelnitsky Natl Univ, Dept Comp Engn & Syst Programming, Khmelnitsky, Ukraine
来源
2020 IEEE 11TH INTERNATIONAL CONFERENCE ON DEPENDABLE SYSTEMS, SERVICES AND TECHNOLOGIES (DESSERT): IOT, BIG DATA AND AI FOR A SAFE & SECURE WORLD AND INDUSTRY 4.0 | 2020年
关键词
cyberattack; cyberattack detection; DDoS; cybersecurity; genetic algorithms; malware; crossover; mutation; population; adaptation; evolution; DDOS ATTACK DETECTION;
D O I
10.1109/dessert50317.2020.9125016
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
An article presents an approach for cyberattack detection based on genetic algorithms is presented. The method allows detecting both known and unknown cyberattacks. The method has the heuristic nature and is based on the collected data about the cyberattacks. It makes it possible to give an answer about the cyberattacks' existence in the computer networks and its hosts. Developed attack detection approach consists of training and detection stages. The mechanism of attack detection system is based on the cyberattacks' features gathering from network or hosts, extracting the subset of acquired set and generation the attacks' detection rules. Genetic algorithms are used for the minimization of the feature set, which allows effective using of the system resources for attacks detection. In order to detect the attacks, the proposed technique involves the rule generation. The attacks' features are described by the set of sub-rules. It is suggested to use the feature with the smallest domain for generating the minimal set for rules. It is possible to select the optimal feature after all selected features which were discovered while applying the genetic algorithm. The sub-rule set is used with the aim to reduce false positive rate.
引用
收藏
页码:127 / 132
页数:6
相关论文
共 37 条
[1]  
Ahmed ME, 2017, IEEE MILIT COMMUN C, P11, DOI 10.1109/MILCOM.2017.8170802
[2]   Phishing Analysis of Websites Using Classification Techniques [J].
Aksu, Dogukan ;
Turgut, Zeynep ;
Ustebay, Serpil ;
Aydin, Muhammed Ali .
INTERNATIONAL TELECOMMUNICATIONS CONFERENCE, ITELCON 2017, 2019, 504 :251-258
[3]  
[Anonymous], 2019, INT J DIGITAL ENTERP
[4]  
[Anonymous], COMM COM INF SC
[5]  
Atamanyuk I., 2015, P 11 INT C ICTERI 20, V1356, P507
[6]  
Canadian Institute for Cybersecurity, 2020, BOTN DAT
[7]  
Check Point Research, 2020 CYB SEC REP
[8]   XGBoost Classifier for DDoS Attack Detection and Analysis in SDN-based Cloud [J].
Chen, Zhuo ;
Jiang, Fu ;
Cheng, Yijun ;
Gu, Xin ;
Liu, Weirong ;
Peng, Jun .
2018 IEEE INTERNATIONAL CONFERENCE ON BIG DATA AND SMART COMPUTING (BIGCOMP), 2018, :251-256
[9]   An Abnormal Network Flow Feature Sequence Prediction Approach for DDoS Attacks Detection in Big Data Environment [J].
Cheng, Jieren ;
Xu, Ruomeng ;
Tang, Xiangyan ;
Sheng, Victor S. ;
Cai, Canting .
CMC-COMPUTERS MATERIALS & CONTINUA, 2018, 55 (01) :95-119
[10]  
D'Cruze Hubert., 2018, Information Technology-New Generations, P141