pith. machine review for the scientific record. sign in

arxiv: 2304.13941 · v2 · submitted 2023-04-27 · 💻 cs.CR

Recognition: unknown

Detection of Anomalous Network Nodes via Hierarchical Prediction and Extreme Value Theory

Authors on Pith no claims yet
classification 💻 cs.CR
keywords nodesnetworkanomalousbehaviourcallsdetectdetectionextreme
0
0 comments X
read the original abstract

Continuously evolving cyber-attacks against industrial networks reduce the effectiveness of signature-based detection methods. Once malware has infiltrated a network (for example, entering via an unsecured device), it can infect further network nodes and carry out malicious activity. Infected nodes can exhibit unusual behaviour in their use of Address Resolution Protocol (ARP) calls within the network. In order to detect such anomalous nodes, we propose a two-stage method: (i) modelling of ARP call behaviour via hierarchical time series prediction methods, and (ii) exploiting Extreme Value Theory (EVT) to robustly detect whether deviations from expected behaviour are anomalous. EVT is able to handle heavy-tailed distributions which are exhibited by internet traffic. Empirical evaluations on a real-life dataset containing over 10M ARP calls from 362 nodes show that the proposed method results in considerably reduced number of false positives, addressing the problem of alert fatigue commonly reported by security professionals.

This paper has not been read by Pith yet.

discussion (0)

Sign in with ORCID, Apple, or X to comment. Anyone can read and Pith papers without signing in.