Inicio  /  Applied Sciences  /  Vol: 9 Par: 20 (2019)  /  Artículo
ARTÍCULO
TITULO

Unexpected-Behavior Detection Using TopK Rankings for Cybersecurity

Alvaro Parres-Peredo    
Ivan Piza-Davila and Francisco Cervantes    

Resumen

Anomaly-based intrusion detection systems use profiles to characterize expected behavior of network users. Most of these systems characterize the entire network traffic within a single profile. This work proposes a user-level anomaly-based intrusion detection methodology using only the user?s network traffic. The proposed profile is a collection of TopK rankings of reached services by the user. To detect unexpected behaviors, the real-time traffic is organized into TopK rankings and compared to the profile using similarity measures. The experiments demonstrated that the proposed methodology was capable of detecting a particular kind of malware attack in all the users tested.

 Artículos similares

       
 
Yiming Mo, Lei Wang, Wenqing Hong, Congzhen Chu, Peigen Li and Haiting Xia    
The intrusion of foreign objects on airport runways during aircraft takeoff and landing poses a significant safety threat to air transportation. Small-scale Foreign Object Debris (FOD) cannot be ruled out on time by traditional manual inspection, and the... ver más
Revista: Applied Sciences

 
Ted H. Szymanski    
The next-generation ?Industrial Internet of Things? (IIoT) will support ?Machine-to-Machine? (M2M) communications for smart Cyber-Physical-Systems and Industry 4.0, and require guaranteed cyber-security. This paper explores hardware-enforced cyber-securi... ver más
Revista: Information

 
Abhishek Phadke, F. Antonio Medrano, Tianxing Chu, Chandra N. Sekharan and Michael J. Starek    
UAV swarms have multiple real-world applications but operate in a dynamic environment where disruptions can impede performance or stop mission progress. Ideally, a UAV swarm should be resilient to disruptions to maintain the desired performance and produ... ver más
Revista: Aerospace

 
Gianmarco Baldini    
Cybersecurity in modern vehicles has received increased attention from the research community in recent years. Intrusion Detection Systems (IDSs) are one of the techniques used to detect and mitigate cybersecurity risks. This paper proposes a novel imple... ver más
Revista: Information

 
Hongpo Zhang, Bo Zhang, Lulu Huang, Zhaozhe Zhang and Haizhaoyang Huang    
Internet of Things (IoT) devices and services provide convenience but face serious security threats. The network intrusion detection system is vital in ensuring the security of the IoT environment. In the IoT environment, we propose a novel two-stage int... ver más
Revista: Information