An autoML network traffic analyzer for cyber threat detection

被引:0
|
作者
Alexandros Papanikolaou
Aggelos Alevizopoulos
Christos Ilioudis
Konstantinos Demertzis
Konstantinos Rantos
机构
[1] Innovative Secure Technologies P.C.,Department of Information and Electronic Engineering
[2] International Hellenic University,Department of Computer Science
[3] International Hellenic University,undefined
来源
International Journal of Information Security | 2023年 / 22卷
关键词
Cyber threat intelligent; Cyber threat information; Information sharing; Industrial environment; Cybersecurity;
D O I
暂无
中图分类号
学科分类号
摘要
Timely detection and effective treatment of cyber-attacks for protecting personal and sensitive data from unauthorized disclosure constitute a core demand of citizens and a legal obligation of organizations that collect and process personal data. SMEs and organizations understand their obligation to comply with GDPR and protect the personal data they have in their possession. They invest in advanced and intelligent solutions to increase their cybersecurity posture. This article introduces a ground-breaking Network Traffic Analyzer, a crucial component of the Cyber-pi project's cyber threat intelligent information sharing architecture (CTI2SA). The suggested system, built on the Lambda (λ) architecture, enhances active cybersecurity approaches for traffic analysis by combining batch and stream processing to handle massive amounts of data. The Network Traffic Analyzer's core module has an automatic model selection mechanism that selects the ML model with the highest performance among its rivals. The goal is to keep the architecture's overall threat identification capabilities functioning effectively.
引用
收藏
页码:1511 / 1530
页数:19
相关论文
共 50 条
  • [21] Dataset Generation for Development of Multi-Node Cyber Threat Detection Systems
    Bieniasz, Jedrzej
    Szczypiorski, Krzysztof
    ELECTRONICS, 2021, 10 (21)
  • [22] Practical Cyber Threat Intelligence in the UK Energy Sector
    Paice, Alan
    McKeown, Sean
    PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON CYBERSECURITY, SITUATIONAL AWARENESS AND SOCIAL MEDIA, CYBER SCIENCE 2022, 2023, : 3 - 23
  • [23] Insider threat detection in cyber-physical systems: a systematic literature review
    Al-Mhiqani, Mohammed Nasser
    Alsboui, Tariq
    Al-Shehari, Taher
    Abdulkareem, Karrar hameed
    Ahmad, Rabiah
    Mohammed, Mazin Abed
    COMPUTERS & ELECTRICAL ENGINEERING, 2024, 119
  • [24] Cyber Threat Detection Based on Artificial Neural Networks Using Event Profiles
    Lee, Jonghoon
    Kim, Jonghyun
    Kim, Ikkyun
    Han, Kijun
    IEEE ACCESS, 2019, 7 : 165607 - 165626
  • [25] An Efficient Hybrid Approach for Intrusion Detection in Cyber Traffic Using Autoencoders
    Giri K.
    Gupta M.
    Dadheech P.
    SN Computer Science, 4 (5)
  • [26] Cyber Security - Threat Scenarios, Policy Framework and Cyber Wargames
    Vaseashta, Ashok
    Susmann, Philip
    Braman, Eric
    CYBER SECURITY AND RESILIENCY POLICY FRAMEWORK, 2014, 38 : 1 - 10
  • [27] Cyber Threat Intelligence Model: An Evaluation of Taxonomies, Sharing Standards, and Ontologies within Cyber Threat Intelligence
    Mavroeidis, Vasileios
    Bromander, Siri
    2017 EUROPEAN INTELLIGENCE AND SECURITY INFORMATICS CONFERENCE (EISIC), 2017, : 91 - 98
  • [28] Improved Cyber Threat Indicator Sharing by Scoring Privacy Risk
    Best, Daniel M.
    Bhatia, Jaspreet
    Peterson, Elena S.
    Breaux, Travis D.
    2017 IEEE INTERNATIONAL SYMPOSIUM ON TECHNOLOGIES FOR HOMELAND SECURITY (HST), 2017,
  • [29] SmartValidator: A framework for automatic identification and classification of cyber threat data
    Islam, Chadni
    Babar, M. Ali
    Croft, Roland
    Janicke, Helge
    JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2022, 202
  • [30] Robust Botnet DGA Detection: Blending XAI and OSINT for Cyber Threat Intelligence Sharing
    Suryotrisongko, Hatma
    Musashi, Yasuo
    Tsuneda, Akio
    Sugitani, Kenichi
    IEEE ACCESS, 2022, 10 : 34613 - 34624