2021
DOI: 10.3390/electronics10141682
|View full text |Cite
|
Sign up to set email alerts
|

Experimental Cyber Attack Detection Framework

Abstract: Digital security plays an ever-increasing, crucial role in today’s information-based society. The variety of threats and attack patterns has dramatically increased with the advent of digital transformation in our lives. Researchers in both public and private sectors have tried to identify new means to counteract these threats, seeking out-of-the-box ideas and novel approaches. Amongst these, data analytics and artificial intelligence/machine learning tools seem to gain new ground in digital defence. However, s… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
7
0
1

Year Published

2021
2021
2024
2024

Publication Types

Select...
3
2
2

Relationship

1
6

Authors

Journals

citations
Cited by 11 publications
(8 citation statements)
references
References 21 publications
0
7
0
1
Order By: Relevance
“…The actual website was delivered using the popular WordPress CMS version 5.7. The web server also hosted the ECAD monitoring agents (Mironeanu et al, 2021;Mironeanu, 2021) responsible for real-time network traffic capture and for implementing the decisions issued by the underlying layers. Normal access patterns have been both simulated using httrack on three different workstations and human client interaction.…”
Section: Preliminary Resultsmentioning
confidence: 99%
See 2 more Smart Citations
“…The actual website was delivered using the popular WordPress CMS version 5.7. The web server also hosted the ECAD monitoring agents (Mironeanu et al, 2021;Mironeanu, 2021) responsible for real-time network traffic capture and for implementing the decisions issued by the underlying layers. Normal access patterns have been both simulated using httrack on three different workstations and human client interaction.…”
Section: Preliminary Resultsmentioning
confidence: 99%
“…The present study is a fork of the research conducted while developing the ECAD framework -previously published in (Mironeanu et al, 2021). For this present study, we have focused on the analytical modules included in ECAD.…”
Section: Conclusion and Further Developmentmentioning
confidence: 99%
See 1 more Smart Citation
“…In preliminary measurements, we introduced a certain confidence level that steers the interspersion of FPs and FNs with a certain probability. From the binary classification result providing the amount of TPs, TNs, FPs, and FNs, we can derive the socalled F1-score as the harmonic mean of precision and sensitivity by F1 = TP TP+ 1 2 ×(FP+FN)…”
Section: Soaapr Clusteringmentioning
confidence: 99%
“…Misuse-based systems, also denoted as signature-based or knowledge-based, detect attacks based on already known patterns (signatures). Being quite fast and reliable in terms of detecting known attacks, they are not designed to uncover novel ones whose signatures are not available; thus, misuse-based detection is no longer enough [1]. The growth of Machine Learning (ML) has led to a boost in anomaly-based detection methods that create a model of trusted activity from a set of collected data samples and identify malicious activity by analyzing behavior deviations.…”
Section: Introductionmentioning
confidence: 99%