Detecting inner-LAN anomalies using hierarchical forecasting

04/27/2023
by   Sevvandi Kandanaarachchi, et al.
0

Increasing activity and the number of devices online are leading to increasing and more diverse cyber attacks. This continuously evolving attack activity makes signature-based detection methods ineffective. Once malware has infiltrated into a LAN, bypassing an external gateway or entering via an unsecured mobile device, it can potentially infect all nodes in the LAN as well as carry out nefarious activities such as stealing valuable data, leading to financial damage and loss of reputation. Such infiltration could be viewed as an insider attack, increasing the need for LAN monitoring and security. In this paper we aim to detect such inner-LAN activity by studying the variations in Address Resolution Protocol (ARP) calls within the LAN. We find anomalous nodes by modelling inner-LAN traffic using hierarchical forecasting methods. We substantially reduce the false positives ever present in anomaly detection, by using an extreme value theory based method. We use a dataset from a real inner-LAN monitoring project, containing over 10M ARP calls from 362 nodes. Furthermore, the small number of false positives generated using our methods, is a potential solution to the "alert fatigue" commonly reported by security experts.

READ FULL TEXT

page 3

page 22

page 24

page 25

page 26

research
06/07/2020

Hybrid Model for Anomaly Detection on Call Detail Records by Time Series Forecasting

Mobile network operators store an enormous amount of information like lo...
research
07/27/2021

Detection of cybersecurity attacks through analysis of web browsing activities using principal component analysis

Organizations such as government departments and financial institutions ...
research
04/12/2021

Using a Neural Network to Detect Anomalies given an N-gram Profile

In order to detect unknown intrusions and runtime errors of computer pro...
research
04/27/2019

Exploring Information Centrality for Intrusion Detection in Large Networks

Modern networked systems are constantly under threat from systemic attac...
research
04/11/2023

Detecting Anomalous Microflows in IoT Volumetric Attacks via Dynamic Monitoring of MUD Activity

IoT networks are increasingly becoming target of sophisticated new cyber...
research
12/06/2018

Cyber Anomaly Detection Using Graph-node Role-dynamics

Intrusion detection systems (IDSs) generate valuable knowledge about net...
research
12/01/2018

AnyThreat: An Opportunistic Knowledge Discovery Approach to Insider Threat Detection

Insider threat detection is getting an increased concern from academia, ...

Please sign up or login with your details

Forgot password? Click here to reset