Informatics and Automation
RUS  ENG    JOURNALS   PEOPLE   ORGANISATIONS   CONFERENCES   SEMINARS   VIDEO LIBRARY   PACKAGE AMSBIB  
General information
Latest issue
Archive

Search papers
Search references

RSS
Latest issue
Current issues
Archive issues
What is RSS



Informatics and Automation:
Year:
Volume:
Issue:
Page:
Find






Personal entry:
Login:
Password:
Save password
Enter
Forgotten password?
Register


Informatics and Automation, 2022, Issue 21, volume 6, Pages 1328–1358
DOI: https://doi.org/10.15622/ia.21.6.9
(Mi trspy1227)
 

This article is cited in 2 scientific papers (total in 2 papers)

Information Security

Anomaly and cyber attack detection technique based on the integration of fractal analysis and machine learning methods

I. Kotenkoab, I. Saenkob, O. Lautac, A. Kriebelb

a Saint Petersburg National Research University of Information Technologies, Mechanics and Optics (ITMO University)
b St. Petersburg Federal Research Center of the Russian Academy of Sciences (SPC RAS)
c State University of the Sea and River Fleet named after Admiral S.O. Makarov
Abstract: In modern data transmission networks, in order to constantly monitor network traffic and detect abnormal activity in it, as well as identify and classify cyber attacks, it is necessary to take into account a large number of factors and parameters, including possible network routes, data delay times, packet losses and new traffic properties that differ from normal. All this is an incentive to search for new methods and techniques for detecting cyber attacks and protecting data networks from them. The article discusses a technique for detecting anomalies and cyberattacks, designed for use in modern data networks, which is based on the integration of fractal analysis and machine learning methods. The technique is focused on real-time or near-real-time execution and includes several steps: (1) detecting anomalies in network traffic, (2) identifying cyber attacks in anomalies, and (3) classifying cyber attacks. The first stage is implemented using fractal analysis methods (evaluating the self-similarity of network traffic), the second and third stages are implemented using machine learning methods that use cells of recurrent neural networks with a long short-term memory. The issues of software implementation of the proposed technique are considered, including the formation of a data set containing network packets circulating in the data transmission network. The results of an experimental evaluation of the proposed technique, obtained using the generated data set, are presented. The results of the experiments showed a rather high efficiency of the proposed technique and the solutions developed for it, which allow early detection of both known and unknown cyber attacks.
Keywords: cyber attack, fractal analysis, Hurst exponent, machine learning, LSTM.
Funding agency Grant number
Ministry of Science and Higher Education of the Russian Federation FFZF-2022-0007
The reported study was partially funded by the budget project FFZF-2022-0007.
Received: 08.09.2022
Document Type: Article
UDC: 004.056.5
Language: Russian
Citation: I. Kotenko, I. Saenko, O. Lauta, A. Kriebel, “Anomaly and cyber attack detection technique based on the integration of fractal analysis and machine learning methods”, Informatics and Automation, 21:6 (2022), 1328–1358
Citation in format AMSBIB
\Bibitem{KotSaeLau22}
\by I.~Kotenko, I.~Saenko, O.~Lauta, A.~Kriebel
\paper Anomaly and cyber attack detection technique based on the integration of fractal analysis and machine learning methods
\jour Informatics and Automation
\yr 2022
\vol 21
\issue 6
\pages 1328--1358
\mathnet{http://mi.mathnet.ru/trspy1227}
\crossref{https://doi.org/10.15622/ia.21.6.9}
Linking options:
  • https://www.mathnet.ru/eng/trspy1227
  • https://www.mathnet.ru/eng/trspy/v21/i6/p1328
  • This publication is cited in the following 2 articles:
    Citing articles in Google Scholar: Russian citations, English citations
    Related articles in Google Scholar: Russian articles, English articles
    Informatics and Automation
    Statistics & downloads:
    Abstract page:248
    Full-text PDF :619
     
      Contact us:
     Terms of Use  Registration to the website  Logotypes © Steklov Mathematical Institute RAS, 2024