Use of Ai in Operational Technology Networks and Packet-based Attacks Detection

DOWNLOAD DOI: 10.62897/COS2023.1-1.62

Author:

Zoltán Dobrádya

Swarco Futurit GmbH. A-2380 Perchtolsdorf, Mühlgasse 86

Szilárd L. Takács

Szechenyi Istvan University H-9026 Gyor, Egyetem ter 1

Timót Hidvégi

Szechenyi Istvan University H-9026 Gyor, Egyetem ter 1

dobrady_zoltan@icloud.com


Abstract:This research is focused on cybersecurity, including the detection of packet-based attacks. We collected a large amount of data by creating Honeypots and hosting them on virtualised private servers (VPS) with open IP addresses. The acquired data was analysed using different deep learning methods, such as Long Short-Term Memory (LSTM) and one-dimensional convolutional neural network techniques. These algorithms were used to compare the measurements with currently used packet analysis techniques, resulting in the identification and development of the most efficient packet analysis procedure. Additionally, we conducted regression tests in isolated and simulated environments using the attack mechanisms that had already been detected. Once the packet analysis concept was developed, our goal was to improve a classification algorithm. The construction of a penalty decision algorithm was crucial. We also conducted extensive regression testing of the concept from various perspectives. Upon completion of our investigation, it was discovered that natural and statistically-based language models can identify cyber-attacks. Statistical models that better fitted were SVC, Logistic, and Naive Bayes, with a 69 % accuracy for packet-based attack detection.


 

REFERENCES

Aljabri M., Aljameel S.S., Mohammad R.M.A., Almotiri S.H., Mirza S., Anis F.M., Aboulnour M., Alomari D.M., Alhamed D.H., Altamimi H.S., 2021, Intelligent Techniques for Detecting Network Attacks: Review and Research Directions. Sensors, 21, 7070.

Alpaydin E., 2020, Introduction to machine learning, MIT Press Cambridge, Massachusetts, London, England 140 – 145.

Bayer J.S., 2015, Learning sequence representations, PhD Thesis, Technical University of Munich, Munich, Germany, 13 – 16, 32 – 34.

Ben-Hur A., Horn D., Siegelmann H.T., Vapnik V., 2001, Support vector clustering, Journal of Machine Learning Research, 2, 125–137.

Breiman L., 2001, Random Forests. Machine Learning, 45, 5 – 32.

Duda R.O., Hart P.E., Stork D.G., 2001, Pattern Classification. Wiley, New York, USA.

Ghojogh B., Crowley M., 2019, Linear and Quadratic Discriminant Analysis: Tutorial, arXiv:1906.02590, <arxiv.org/abs/1906.02590>, accessed 21.08.2023.

Hastie T., Tibshirani R., Fiedman J., 2009, The elements of statistical learning: Data Mining, Inference, and Prediction, Springer Science and Business, New York, NY, USA, 14 – 18.

Kuzlu M., Fair C., Guler O.,2021, Role of Artificial Intelligence in the Internet of Things (IoT) cybersecurity. Discover Internet Things, 1, 7.

Luo W., Li Y., Urtasun R., Zemel R.S., 2016, Understanding the Effective Receptive Field in Deep Convolutional Neural Networks. Neural Information Processing Systems, 29, 4898 – 4906.

Russell S.J., Norvig P., 2005, Artificial Intelligence a Modern Approach. Pearson – Prentice Hall, Upper Saddle River, New Jersey, 635 – 638, 726 – 727.

Saharkhizan M., Azmoodeh A., Dehghantanha A., Choo K.R., Parizi R.M., 2020, An Ensemble of Deep Recurrent Neural Networks for Detecting IoT Cyber Attacks Using Network Traffic. IEEE Internet of Things Journal, 7, 8852 – 8859.


Connection

E-mail address: cos@sze.hu

Latest news

  • 10 invited keynotes and 2 plenaries
  • 300 abstracts 
  • 196 manuscripts for oral presentation (until now)