1. An Approach for Anomaly Detection in Network Communications Using k-Path Analysis
- Author
-
Mamadou Kasse, Rodolphe Charrier, Alexandre Berred, Cyrille Bertelle, and Christophe Delpierre
- Subjects
cybersecurity ,cyberattacks ,Markovian model ,generalized maximum likelihood ratio ,computer networks ,network traffic ,Technology (General) ,T1-995 - Abstract
In this paper, we present an innovative approach inspired by the Path-scan model to detect paths with k adjacent edges (k-path) exhibiting unusual behavior (synonymous with anomaly) within network communications. This work is motivated by the challenge of identifying malicious activities carried out in vulnerable k-path in a small to medium-sized computer network. Each observed edge (time series of the number of events or the number of packets exchanged between two computers in the network) is modeled using the three-state observed Markov model, as opposed to the Path-scan model which uses a two-state model (active state and inactive state), to establish baselines of behavior in order to detect anomalies. This model captures the typical behavior of network communications, as well as patterns of suspicious activity, such as those associated with brute force attacks. We take a perspective by analyzing each vulnerable k-path, enabling the accurate detection of anomalies on the k-path. Using this approach, our method aims to enhance the detection of suspicious activities in computer networks, thus providing a more robust and accurate solution to ensure the security of computer systems.
- Published
- 2024
- Full Text
- View/download PDF