Realtime Network Based Anomaly Detection and Malware Analysis for SMEs and Smart Homes

Abstract

The increasing risk landscape of cyberattacks requires the implementation of strong solutions for detecting anomalies in real-time within network systems and analyzing malware. These solutions should be specifically designed to cater to the needs of Small and Medium-sized Enterprises (SMEs) and smart homes. This study presents a comprehensive framework to effectively address the pressing security concern at hand. To begin with, a cost-effective and advanced firewall architecture, based on Raspberry Pi, is implemented in order to protect connected devices from external malicious entities. Simultaneously, this architecture captures network traffic for further analysis. By utilizing supervised machine learning models, such as Random Forests, a system has been developed to detect anomalies in Internet of Things (IoT) environments. This system enables timely notifications and facilitates informative discussions regarding the identified irregularities. In order to enhance the ability to detect network anomalies, a unique methodology is implemented, which involves the utilization of Natural Language Processing (NLP). This approach is complemented by the strategic deployment of honeypots to confuse potential attackers and is further supported by a collaborative infrastructure for sharing information on threats. Moreover, this study conducts an analysis of malware using both signature-based and behavior-based approaches. These methodologies are facilitated by supervised machine learning models, which are seamlessly incorporated with an alerting mechanism to ensure prompt notifications. This research study makes a significant contribution to the field by addressing existing gaps in knowledge, such as comparative assessments, zero-day vulnerabilities, user-centric design, and cost-effectiveness considerations. Additionally, it provides a practical guide for enhancing cyber resilience in small and medium-sized enterprises (SMEs) and smart homes.

Country : Sri Lanka

1 K.N.H De Silva2 M.A.S.B Manchanayaka3 D.L.S.I Punyasiri4 H.A.D.N Perera5 Anjalie Gamage6 Narmada Gamage

  1. Department of Computer Systems Engineering, Sri Lanka Institute of Information Technology, New Kandy Rd, Malabe 10115, Sri Lanka
  2. Department of Computer Systems Engineering, Sri Lanka Institute of Information Technology, New Kandy Rd, Malabe 10115, Sri Lanka
  3. Department of Computer Systems Engineering, Sri Lanka Institute of Information Technology, New Kandy Rd, Malabe 10115, Sri Lanka
  4. Department of Computer Systems Engineering, Sri Lanka Institute of Information Technology, New Kandy Rd, Malabe 10115, Sri Lanka
  5. Department of Computer Systems Engineering, Sri Lanka Institute of Information Technology, New Kandy Rd, Malabe 10115, Sri Lanka
  6. Department of Computer Systems Engineering, Sri Lanka Institute of Information Technology, New Kandy Rd, Malabe 10115, Sri Lanka

IRJIET, Volume 7, Issue 10, October 2023 pp. 249-257

doi.org/10.47001/IRJIET/2023.710032

References

  1. “How to stay protected against Cyber Threats? - Advancing Digital Life.” https://www.axiatadigitallabs.com/how-to-stay-protected-against-cyber-threats/ (accessed Aug. 14, 2023).
  2. A.Almogren, H. Almajed, A. Alzahrani, and T. H. H Aldhyani, “Design of Efficient Based Artificial Intelligence Approaches for Sustainable of Cyber Security in Smart Industrial Control System,” Sustain. 2023, Vol. 15, Page 8076, vol. 15, no. 10, p. 8076, May 2023, doi: 10.3390/SU15108076.
  3. B. A. Bhuvaneswari and S. S., “Anomaly detection framework for Internet of things traffic using vector convolutional deep learning approach in fog environment,” Futur. Gener. Comput. Syst., vol. 113, pp. 255–265, Dec. 2020, doi: 10.1016/J.FUTURE.2020.07.020.
  4. A.Chatterjee and B. S. Ahmed, “IoT anomaly detection methods and applications: A survey,” Internet of Things, vol. 19, p. 100568, Aug. 2022, doi: 10.1016/J.IOT.2022.100568.
  5. M. R. Amal and P. Venkadesh, “H-DOCTOR: Honeypot based firewall tuning for attack prevention,” Meas. Sensors, vol. 25, p. 100664, Feb. 2023, doi: 10.1016/J.MEASEN.2022.100664.
  6. S. Sibi Chakkaravarthy, D. Sangeetha, and V. Vaidehi, “A Survey on malware analysis and mitigation techniques,” Comput. Sci. Rev., vol. 32, pp. 1–23, May 2019, doi: 10.1016/J.COSREV.2019.01.002.
  7. “EU’s Cybersecurity Strategy for the Digital Decade.” https://www.cyber-diplomacy-toolbox.com/EU_Cybersecurity_Strategy_for_the_Digital_Decade.html (accessed Aug. 14, 2023).
  8. A.Alqudhaibi, M. Albarrak, A. Aloseel, S. Jagtap, and K. Salonitis, “Predicting Cybersecurity Threats in Critical Infrastructure for Industry 4.0: A Proactive Approach Based on Attacker Motivations,” Sensors 2023, Vol. 23, Page 4539, vol. 23, no. 9, p. 4539, May 2023, doi: 10.3390/S23094539.
  9. K. L. Kermanidis, M. Maragoudakis, N. Rawindaran, A. Jayal, and E. Prakash, “Exploration of the Impact of Cybersecurity Awareness on Small and Medium Enterprises (SMEs) in Wales Using Intelligent Software to Combat Cybercrime,” Comput. 2022, Vol. 11, Page 174, vol. 11, no. 12, p. 174, Dec. 2022, doi: 10.3390/COMPUTERS11120174.
  10. N. Jeffrey and Q. Tan, “A Review of Anomaly Detection Strategies to Detect Threats to Cyber-Physical Systems,” pp. 1–34, 2023.
  11. U. Tariq, I. Ahmed, A. K. Bashir, and K. Shaukat, “A Critical Cybersecurity Analysis and Future Research Directions for the Internet of Things: A Comprehensive Review,” Sensors 2023, Vol. 23, Page 4117, vol. 23, no. 8, p. 4117, Apr. 2023, doi: 10.3390/S23084117.
  12. Y. Li and Q. Liu, “A comprehensive review study of cyber-attacks and cyber security; Emerging trends and recent developments,” Energy Reports, vol. 7, pp. 8176–8186, Nov. 2021, doi: 10.1016/J.EGYR.2021.08.126.
  13. G. Apruzzese et al., “The Role of Machine Learning in Cybersecurity,” Digit. Threat. Res. Pract., vol. 4, no. 1, Mar. 2023, doi: 10.1145/3545574.
  14. I.H. Sarker, “Machine Learning: Algorithms, Real-World Applications and Research Directions,” SN Comput. Sci., vol. 2, no. 3, pp. 1–21, May 2021, doi: 10.1007/S42979-021-00592-X/FIGURES/11.
  15. Y. K. Kim, J. J. Lee, M. H. Go, H. Y. Kang, and K. Lee, “A Systematic Overview of the Machine Learning Methods for Mobile Malware Detection,” Secur. Commun. Networks, vol. 2022, 2022, doi: 10.1155/2022/8621083.
  16. P. Ryciak, K. Wasielewska, and A. Janicki, “Anomaly Detection in Log Files Using Selected Natural Language Processing Methods,” Appl. Sci. 2022, Vol. 12, Page 5089, vol. 12, no. 10, p. 5089, May 2022, doi: 10.3390/APP12105089.
  17. Y. Kang, Z. Cai, C. W. Tan, Q. Huang, and H. Liu, “Natural language processing (NLP) in management research: A literature review,” J. Manag. Anal., vol. 7, no. 2, pp. 139–172, Apr. 2020, doi: 10.1080/23270012.2020.1756939.
  18. Y. Ding, X. Xia, S. Chen, and Y. Li, “A malware detection method based on family behavior graph,” Comput. Secur., vol. 73, pp. 73–86, Mar. 2018, doi: 10.1016/J.COSE.2017.10.007.
  19. M. S. Akhtar and T. Feng, “Malware Analysis and Detection Using Machine Learning Algorithms,” Symmetry 2022, Vol. 14, Page 2304, vol. 14, no. 11, p. 2304, Nov. 2022, doi: 10.3390/SYM14112304.