Back to Search Start Over

An Approach for Anomaly Detection in Network Communications Using k-Path Analysis

Authors :
Mamadou Kasse
Rodolphe Charrier
Alexandre Berred
Cyrille Bertelle
Christophe Delpierre
Source :
Journal of Cybersecurity and Privacy, Vol 4, Iss 3, Pp 449-467 (2024)
Publication Year :
2024
Publisher :
MDPI AG, 2024.

Abstract

In this paper, we present an innovative approach inspired by the Path-scan model to detect paths with k adjacent edges (k-path) exhibiting unusual behavior (synonymous with anomaly) within network communications. This work is motivated by the challenge of identifying malicious activities carried out in vulnerable k-path in a small to medium-sized computer network. Each observed edge (time series of the number of events or the number of packets exchanged between two computers in the network) is modeled using the three-state observed Markov model, as opposed to the Path-scan model which uses a two-state model (active state and inactive state), to establish baselines of behavior in order to detect anomalies. This model captures the typical behavior of network communications, as well as patterns of suspicious activity, such as those associated with brute force attacks. We take a perspective by analyzing each vulnerable k-path, enabling the accurate detection of anomalies on the k-path. Using this approach, our method aims to enhance the detection of suspicious activities in computer networks, thus providing a more robust and accurate solution to ensure the security of computer systems.

Details

Language :
English
ISSN :
2624800X
Volume :
4
Issue :
3
Database :
Directory of Open Access Journals
Journal :
Journal of Cybersecurity and Privacy
Publication Type :
Academic Journal
Accession number :
edsdoj.300dc6ce6cda436683dc96aa52f36c93
Document Type :
article
Full Text :
https://doi.org/10.3390/jcp4030022