Use of Ai in Operational Technology Networks and Packet-based Attacks Detection
DOWNLOAD | DOI: 10.62897/COS2023.1-1.62 |
Author: Zoltán Dobrádya Swarco Futurit GmbH. A-2380 Perchtolsdorf, Mühlgasse 86 Szilárd L. Takács Szechenyi Istvan University H-9026 Gyor, Egyetem ter 1 Timót Hidvégi Szechenyi Istvan University H-9026 Gyor, Egyetem ter 1 |
Abstract:This research is focused on cybersecurity, including the detection of packet-based attacks. We collected a large amount of data by creating Honeypots and hosting them on virtualised private servers (VPS) with open IP addresses. The acquired data was analysed using different deep learning methods, such as Long Short-Term Memory (LSTM) and one-dimensional convolutional neural network techniques. These algorithms were used to compare the measurements with currently used packet analysis techniques, resulting in the identification and development of the most efficient packet analysis procedure. Additionally, we conducted regression tests in isolated and simulated environments using the attack mechanisms that had already been detected. Once the packet analysis concept was developed, our goal was to improve a classification algorithm. The construction of a penalty decision algorithm was crucial. We also conducted extensive regression testing of the concept from various perspectives. Upon completion of our investigation, it was discovered that natural and statistically-based language models can identify cyber-attacks. Statistical models that better fitted were SVC, Logistic, and Naive Bayes, with a 69 % accuracy for packet-based attack detection.
REFERENCES
Aljabri M., Aljameel S.S., Mohammad R.M.A., Almotiri S.H., Mirza S., Anis F.M., Aboulnour M., Alomari D.M., Alhamed D.H., Altamimi H.S., 2021, Intelligent Techniques for Detecting Network Attacks: Review and Research Directions. Sensors, 21, 7070.
Alpaydin E., 2020, Introduction to machine learning, MIT Press Cambridge, Massachusetts, London, England 140 – 145.
Bayer J.S., 2015, Learning sequence representations, PhD Thesis, Technical University of Munich, Munich, Germany, 13 – 16, 32 – 34.
Ben-Hur A., Horn D., Siegelmann H.T., Vapnik V., 2001, Support vector clustering, Journal of Machine Learning Research, 2, 125–137.
Breiman L., 2001, Random Forests. Machine Learning, 45, 5 – 32.
Duda R.O., Hart P.E., Stork D.G., 2001, Pattern Classification. Wiley, New York, USA.
Ghojogh B., Crowley M., 2019, Linear and Quadratic Discriminant Analysis: Tutorial, arXiv:1906.02590, <arxiv.org/abs/1906.02590>, accessed 21.08.2023.
Hastie T., Tibshirani R., Fiedman J., 2009, The elements of statistical learning: Data Mining, Inference, and Prediction, Springer Science and Business, New York, NY, USA, 14 – 18.
Kuzlu M., Fair C., Guler O.,2021, Role of Artificial Intelligence in the Internet of Things (IoT) cybersecurity. Discover Internet Things, 1, 7.
Luo W., Li Y., Urtasun R., Zemel R.S., 2016, Understanding the Effective Receptive Field in Deep Convolutional Neural Networks. Neural Information Processing Systems, 29, 4898 – 4906.
Russell S.J., Norvig P., 2005, Artificial Intelligence a Modern Approach. Pearson – Prentice Hall, Upper Saddle River, New Jersey, 635 – 638, 726 – 727.
Saharkhizan M., Azmoodeh A., Dehghantanha A., Choo K.R., Parizi R.M., 2020, An Ensemble of Deep Recurrent Neural Networks for Detecting IoT Cyber Attacks Using Network Traffic. IEEE Internet of Things Journal, 7, 8852 – 8859.