JCP, Vol. 4, Pages 449-467: An Approach for Anomaly Detection in Network Communications Using k-Path Analysis

2 months ago 24

JCP, Vol. 4, Pages 449-467: An Approach for Anomaly Detection in Network Communications Using k-Path Analysis

Journal of Cybersecurity and Privacy doi: 10.3390/jcp4030022

Authors: Mamadou Kasse Rodolphe Charrier Alexandre Berred Cyrille Bertelle Christophe Delpierre

In this paper, we present an innovative approach inspired by the Path-scan model to detect paths with k adjacent edges (k-path) exhibiting unusual behavior (synonymous with anomaly) within network communications. This work is motivated by the challenge of identifying malicious activities carried out in vulnerable k-path in a small to medium-sized computer network. Each observed edge (time series of the number of events or the number of packets exchanged between two computers in the network) is modeled using the three-state observed Markov model, as opposed to the Path-scan model which uses a two-state model (active state and inactive state), to establish baselines of behavior in order to detect anomalies. This model captures the typical behavior of network communications, as well as patterns of suspicious activity, such as those associated with brute force attacks. We take a perspective by analyzing each vulnerable k-path, enabling the accurate detection of anomalies on the k-path. Using this approach, our method aims to enhance the detection of suspicious activities in computer networks, thus providing a more robust and accurate solution to ensure the security of computer systems.

Read Entire Article