PIDS - A Behavioral Framework for Analysis and Detection of Network Printer Attacks

06/27/2018
by   Asaf Hecht, et al.
0

Nowadays, every organization might be attacked through its network printers. The malicious exploitation of printing protocols is a dangerous and underestimated threat against every printer today, as highlighted by recent published researches. This article presents PIDS (Printers' IDS), an intrusion detection system for detecting attacks on printing protocols. PIDS continuously captures various features and events obtained from traffic produced by printing protocols in order to detect attacks. As part of this research we conducted thousands of automatic and manual printing protocol attacks on various printers and recorded thousands of the printers' benign network sessions. Then we applied various supervised machine learning (ML) algorithms to classify the collected data as normal (benign) or abnormal (malicious). We evaluated several detection algorithms, feature selection methods, and the features needed in order to obtain the best detection results for protocol traffic of printers. Our empirical results suggest that the proposed framework is effective in detecting printing protocol attacks, providing an accuracy of 99.9 with negligible fall-positive rate.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
08/13/2020

Detecting Abnormal Traffic in Large-Scale Networks

With the rapid technological advancements, organizations need to rapidly...
research
06/26/2019

Identifying DNS-tunneled traffic with predictive models

DNS is a distributed, fault tolerant system that avoids a single point o...
research
09/15/2021

Modern Cybersecurity Solution using Supervised Machine Learning

Cybersecurity is essential, and attacks are rapidly growing and getting ...
research
01/25/2022

ML-based tunnel detection and tunneled application classification

Encrypted tunneling protocols are widely used. Beyond business and perso...
research
03/27/2020

Hardware Fingerprinting for the ARINC 429 Avionic Bus

ARINC 429 is the most common data bus in use today in civil avionics. Ho...
research
10/04/2020

DNS Covert Channel Detection via Behavioral Analysis: a Machine Learning Approach

Detecting covert channels among legitimate traffic represents a severe c...
research
12/11/2019

Peek Inside the Closed World: Evaluating Autoencoder-Based Detection of DDoS to Cloud

Machine-learning-based anomaly detection (ML-based AD) has been successf...

Please sign up or login with your details

Forgot password? Click here to reset