411 research outputs found
Methods and Techniques for Dynamic Deployability of Software-Defined Security Services
With the recent trend of ânetwork softwarisationâ, enabled by emerging technologies such as Software-Defined Networking and Network Function Virtualisation, system administrators of data centres and enterprise networks have started replacing dedicated hardware-based middleboxes with virtualised network functions running on servers and end hosts.
This radical change has facilitated the provisioning of advanced and flexible network services, ultimately helping system administrators and network operators to cope with the rapid changes in service requirements and networking workloads.
This thesis investigates the challenges of provisioning network security services in âsoftwarisedâ networks, where the security of residential and business users can be provided by means of sets of software-based network functions running on high performance servers or on commodity devices. The study is approached from the perspective of the telecom operator, whose goal is to protect the customers from network threats and, at the same time, maximize the number of provisioned services, and thereby revenue. Specifically, the overall aim of the research presented in this thesis is proposing novel techniques for optimising the resource usage of software-based security services, hence for increasing the chances for the operator to accommodate more service requests while respecting the desired level of network security of its customers. In this direction, the contributions of this thesis are the following: (i) a solution for the dynamic provisioning of security services that minimises the utilisation of computing and network resources, and (ii) novel methods based on Deep Learning and Linux kernel technologies for reducing the CPU usage of software-based security network functions, with specific focus on the defence against Distributed Denial of Service (DDoS) attacks.
The experimental results reported in this thesis demonstrate that the proposed solutions for service provisioning and DDoS defence require fewer computing resources, compared to similar approaches available in the scientific literature or adopted in production networks
Network Threat Detection Using Machine/Deep Learning in SDN-Based Platforms: A Comprehensive Analysis of State-of-the-Art Solutions, Discussion, Challenges, and Future Research Direction
A revolution in network technology has been ushered in by software defined networking (SDN), which makes it possible to control the network from a central location and provides an overview of the networkâs security. Despite this, SDN has a single point of failure that increases the risk of potential threats. Network intrusion detection systems (NIDS) prevent intrusions into a network and preserve the networkâs integrity, availability, and confidentiality. Much work has been done on NIDS but there are still improvements needed in reducing false alarms and increasing threat detection accuracy. Recently advanced approaches such as deep learning (DL) and machine learning (ML) have been implemented in SDN-based NIDS to overcome the security issues within a network. In the first part of this survey paper, we offer an introduction to the NIDS theory, as well as recent research that has been conducted on the topic. After that, we conduct a thorough analysis of the most recent ML- and DL-based NIDS approaches to ensure reliable identification of potential security risks. Finally, we focus on the opportunities and difficulties that lie ahead for future research on SDN-based ML and DL for NIDS.publishedVersio
Hybrid CNN+LSTM Deep Learning Model for Intrusions Detection Over IoT Environment
The connectivity of devices through the internet plays a remarkable role in our daily lives. Many network-based applications are utilized in different domains, e.g., health care, smart environments, and businesses. These applications offer a wide range of services and provide services to large groups. Therefore, the safety of network-based applications has always been an area of research interest for academia and industry alike. The evolution of deep learning has enabled us to explore new areas of research. Hackers make use of the vulnerabilities in networks and attempt to gain access to confidential systems and information. This information and access to systems can be very harmful and portray losses beyond comprehension. Therefore, detection of these network intrusions is of the utmost importance. Deep learning-based techniques require minimal inputs while exploring every possible feature set in the network. Thus, in this paper, we present a hybrid CNN+LSTM deep learning model for the detection of network intrusions. In this research, we detect DDOS types of network intrusions, i.e., R2L, R2R, Prob, and which belong to the active attack category, and PortScan, which falls in the passive attack category. For this purpose, we used the benchmark CICIDS2017 dataset for conducting the experiments and achieved an accuracy of 99.82% as demonstrated in the experimental results
Machine Learning-Based Anomaly Detection in Cloud Virtual Machine Resource Usage
Anomaly detection is an important activity in cloud computing systems because it aids in the identification of odd behaviours or actions that may result in software glitch, security breaches, and performance difficulties. Detecting aberrant resource utilization trends in virtual machines is a typical application of anomaly detection in cloud computing (VMs). Currently, the most serious cyber threat is distributed denial-of-service attacks. The afflicted server\u27s resources and internet traffic resources, such as bandwidth and buffer size, are slowed down by restricting the server\u27s capacity to give resources to legitimate customers.
To recognize attacks and common occurrences, machine learning techniques such as Quadratic Support Vector Machines (QSVM), Random Forest, and neural network models such as MLP and Autoencoders are employed. Various machine learning algorithms are used on the optimised NSL-KDD dataset to provide an efficient and accurate predictor of network intrusions. In this research, we propose a neural network based model and experiment on various central and spiral rearrangements of the features for distinguishing between different types of attacks and support our approach of better preservation of feature structure with image representations. The results are analysed and compared to existing models and prior research. The outcomes of this study have practical implications for improving the security and performance of cloud computing systems, specifically in the area of identifying and mitigating network intrusions
A Survey on Malware Detection with Graph Representation Learning
Malware detection has become a major concern due to the increasing number and
complexity of malware. Traditional detection methods based on signatures and
heuristics are used for malware detection, but unfortunately, they suffer from
poor generalization to unknown attacks and can be easily circumvented using
obfuscation techniques. In recent years, Machine Learning (ML) and notably Deep
Learning (DL) achieved impressive results in malware detection by learning
useful representations from data and have become a solution preferred over
traditional methods. More recently, the application of such techniques on
graph-structured data has achieved state-of-the-art performance in various
domains and demonstrates promising results in learning more robust
representations from malware. Yet, no literature review focusing on graph-based
deep learning for malware detection exists. In this survey, we provide an
in-depth literature review to summarize and unify existing works under the
common approaches and architectures. We notably demonstrate that Graph Neural
Networks (GNNs) reach competitive results in learning robust embeddings from
malware represented as expressive graph structures, leading to an efficient
detection by downstream classifiers. This paper also reviews adversarial
attacks that are utilized to fool graph-based detection methods. Challenges and
future research directions are discussed at the end of the paper.Comment: Preprint, submitted to ACM Computing Surveys on March 2023. For any
suggestions or improvements, please contact me directly by e-mai
DoS and DDoS mitigation using Variational Autoencoders
DoS and DDoS attacks have been growing in size and number over the last decade and existing solutions to
mitigate these attacks are largely inefficient. Compared to other types of malicious cyber attacks, DoS and
DDoS attacks are particularly challenging to combat. Because of their ability to mask themselves as legitimate
traffic, it has proven difficult to develop methods to detect these types of attacks on a packet or flow level. In
this paper, we explore the potential of Variational Autoencoders to serve as a component within an intelligent
security solution that differentiates between normal and malicious traffic. The motivation behind resorting
to Variational Autoencoders is that unlike normal encoders that would code an input flow as a single point,
they encode a flow as a distribution over the latent space which avoids overfitting. Intuitively, this allows a
Variational Autoencoder to not only learn latent representations of seen input features, but to generalize in a
way that allows for an interpretation of unseen flows and flow features with slight variations.
Two methods based on the ability of Variational Autoencoders to learn latent representations from network
traffic flows of both benign and malicious traffic, are proposed. The first method resorts to a classifier based on
the latent encodings obtained from Variational Autoencoders learned from traffic traces. The second method
is an anomaly detection method, where the Variational Autoencoder is used to learn the abstract feature
representations of exclusively legitimate traffic. Anomalies are then filtered out by relying on the reconstruction
loss of the Variational Autoencoder. In this sense, the construction loss of the autoencoder is fed as input to
a classifier that outputs the class of the traffic including benign and malign, and eventually the attack type.
Thus, the second approach operates with two separate training processes on two separate data sources: the
first training involving only legitimate traffic, and the second training involving all traffic classes. This is
different from the first approach which operates only a single training process on the whole traffic dataset.
Thus, the autoencoder of the first approach aspires to learn a general feature representation of the flows while
the autoencoder of the second approach aims to exclusively learn a representation of the benign traffic. The
second approach is thus more susceptible to finding zero day attacks and discovering new attacks as anomalies.
Both of the proposed methods have been thoroughly tested on two separate datasets with a similar feature
space. The results show that both methods are promising, with the classifier-based method being slightly
superior to the anomaly-based one
- âŠ