Ijraset Journal For Research in Applied Science and Engineering Technology
Authors: Prof. Prakash Kshirsagar , Prof. Vrushali Wankhede , Abhijeet Hingane , Pankaj Kadam, Rutuja Patil, Harshali Tolkar
DOI Link: https://doi.org/10.22214/ijraset.2024.60466
Certificate: View Certificate
The rapid evolution of digital technologies has revolutionized the way we connect and conduct our daily activities, offering unparalleled convenience. However, this digital transformation has also exposed our interconnected systems to a myriad of cyber threats. Thus, the significance of robust cyber attack detection mechanisms cannot be emphasized enough. As cyber threats become increasingly complex and sophisticated, it is imperative to employ advanced detection techniques to effectively counter them. Cyber attack detection serves as a crucial safeguard for digital assets and critical systems, ensuring their integrity and functionality. This paper explores the fundamental principles and modern strategies employed in cyber attack detection. Given the ever-changing tactics of malicious actors, detecting cyber attacks presents a multifaceted challenge that requires continuous adaptation and innovation.
I. INTRODUCTION
The In today’s digital age, cyberattacks have transcended mere nuisances to become formidable threats affecting individuals, organizations, and governments on a global scale. Ranging from commonplace phishing scams to meticulously orchestrated, state-sponsored cyber espionage campaigns, these attacks pose significant risks to the fabric of our digital existence. To fortify our defenses and shield sensitive data, critical infrastructure, and overall cybersecurity, the establishment of robust cyber attack detection mechanisms is imperative. Cyber attack detection encompasses a comprehensive process involving the identification, analysis, and swift response to unauthorized access, malicious activities, or anomalies within the intricate web of computer systems, networks, and digital environments. Its primary objective is to swiftly detect and neutralize threats, minimizing potential damage and upholding the pillars of data integrity, confidentiality, and availability.
The universal applicability of cyber attack detection underscores its pivotal role in preserving the sanctity of data, privacy, operational continuity, and resilience against the diverse array of cyber threats prevalent in today’s interconnected world. These detection systems have evolved in tandem with the escalating sophistication of cyber threats, enabling swift identification and proactive responses to a myriad of dangers, including malware, ransomware, phishing attempts, and zero-day exploits.
Remarkable advancements in detection technologies have facilitated continuous real-time monitoring of network activities, empowering organizations to swiftly identify anomalies and suspicious behaviors that may indicate an impending cyber attack. By leveraging these achievements, stakeholders can bolster their cybersecurity posture and navigate the evolving threat landscape with greater resilience and confidence.
II. LITERATURE REVIEW
Author: YU AN, AND DONG LIU,
Abstract: Modern distribution power system has become a typical cyber-physical system (CPS), where reliable automation control process is heavily depending on the accurate measurement data. However, the cyber-attacks on CPS may manipulate the measurement data and mislead the control system to make incorrect operational decisions. Two types of cyber-attacks (e.g., transient cyber-attacks and steady cyberattacks) as well as their attack templates are modeled in this paper. To effectively and accurately detect these false data injections, a multivariate Gaussian based anomaly detection method is proposed. The correlation features of comprehensive measurement data captured by micro-phasor measurement units (µPMU) are developed to train multivariate Gaussian models for the anomaly detection of transient and steady cyberattacks, respectively. A k-means clustering method is introduced to reduce the number of µPMUs and select the placement of µPMUs. Numerical simulations on the IEEE 34 bus system show that the proposed method can effectively detect the false data injections on measurement sensors of distribution systems
2. Paper Name: KeySplitWatermark: Zero Watermarking Algorithm for Software Protection Against Cyber-Attacks
Author: CELESTINE IWENDI ABDUL REHMAN JAVED
Abstract: Cyber-attacks are evolving at a disturbing rate. Data breaches, ransomware attacks, cryptojacking, malware and phishing attacks are now rampant. In this era of cyber warfare, the software industry is also growing with an increasing number of software being used in all domains of life. This evolution has added to the problems of software vendors and users where they have to prevent a wide range of attacks. Existing watermark detection solutions have a low detection rate in the software. In order to address this issue, this paper proposes a novel blind Zero code based Watermark detection approach named KeySplitWatermark, for the protection of software against cyber-attacks. The algorithm adds watermark logically into the code utilizing the inherent properties of code and gives a robust solution. The embedding algorithm uses keywords to make segments of the code to produce a key-dependent on the watermark
3. Paper Name: Cyber-attack Detection Strategy Based on Distribution System State Estimation
Author: Huan Long, Zhi Wu, Member, Chen Fang
Abstract: Cyber-attacks that tamper with measurement information threaten the security of state estimation for the current distribution system.This paper proposes a cyberattack detec- tion strategy based on distribution system state estimation (DSSE). The uncertainty of the distribution network is represented by the interval of each state variable. A three phase in- terval DSSE model is proposed to construct the interval of each state variable. An improved iterative algorithm (IIA) is devel- oped to solve the interval DSSE model and to obtain the lower and upper bounds of the interval. A cyber-attack is detected when the value of the state variable estimated by the traditional DSSE is out of the corresponding interval determined by the interval DSSE.
4. Paper Name: Fog-Based Attack Detection Framework for Internet of Things Using Deep Learning
Author: AHMED SAMY 1,2, HAINING YU , AND HONGLI ZHANG
Abstract: The number of cyber-attacks and data breaches has immensely increased across different enterprises, companies, and industries as a result of the exploitation of the weaknesses in securing Internet of Things (IoT) devices. The increasing number of various devices connected to IoT and their different protocols has led to growing volume of zero-day attacks. Deep learning (DL) has demonstrated its superiority in big data fields and cyber-security. Recently, DL has been used in cyber-attacks detection because of its capability of extracting and learning deep features of known attacks and detecting unknown attacks without the need for manual feature engineering. However, DL cannot be implemented on IoT devices with limited resources because it requires extensive computation, strong power and storage capabilities. This paper presents a comprehensive attack detection framework of a distributed, robust, and high detection rate to detect several IoT cyber-attacks using DL
5. Paper Name: Fronesis: Digital Forensics-Based Early Detection of Ongoing CyberAttacks
Author: ATHANASIOS DIMITRIADIS, EFSTRATIOS LONTZETIDIS
Abstract: The integration of communication networks and the Internet of Things (IoT) in Industrial Control Systems (ICSs) increases their vulnerability towards cyber-attacks, causing devastating outcomes. Traditional Intrusion Detection Systems (IDSs), which are mainly developed to support information technology systems, count vastly on predefined models and are trained mostly on specific cyber-attacks. Besides, most IDSs do not consider the imbalanced nature of ICS datasets, thereby suffering from low accuracy and high false-positive when being put to use. In this paper, we propose a deep learning model to construct new balanced representations of the imbalanced datasets. The new representations are fed into an ensemble deep learning attack detection model specifically designed for an ICS environment. The proposed attack detection model leverages Deep Neural Network (DNN) and Decision Tree (DT) classifiers to detect cyber-attacks from the new representations.
6. Paper Name: Fronesis: Digital Forensics-Based Early Detection of Ongoing CyberAttacks
Author: ATHANASIOS DIMITRIADIS, EFSTRATIOS LONTZETIDIS
Abstract: Traditional attack detection approaches utilize predefined databases of known signatures about already-seen tools and malicious activities observed in past cyber-attacks to detect future attacks. More sophisticated approaches apply machine learning to detect abnormal behavior. Nevertheless, a growing number of successful attacks and the increasing ingenuity of attackers prove that these approaches are insufficient. This paper introduces an approach for digital forensics-based early detection of ongoing cyber-attacks called Fronesis. The approach combines ontological reasoning with the MITRE ATTCK framework, the Cyber Kill Chain model, and the digital artifacts acquired continuously from the monitored computer system.
7. Paper Name: Cyber Attack Detection Based on Wavelet Singular Entropy in AC Smart Islands: False Data Injection Attack
Author: MOSLEM DEHGHANI , MOHAMMAD GHIASI , TAHER NIKNAM
Abstract: Since Smart-Islands (SIs) with advanced cyber-infrastructure are incredibly vulnerable to cyber-attacks, increasing attention needs to be applied to their cybersecurity. False data injection attacks (FDIAs) by manipulating measurements may cause wrong state estimation (SE) solutions or interfere with the central control system performance. There is a possibility that conventional attack detection methods do not detect many cyber-attacks; hence, system operation can interfere. Research works are more focused on detecting cyber-attacks that target DC-SE; however, due to more widely uses of AC SIs, investigation on cyber-attack detection in AC systems is more crucial. In these regards, a new mechanism to detect injection of any false data in AC-SE based on signal processing technique is proposed in this paper. Malicious data injection in the state vectors may cause deviation of their temporal and spatial data correlations from their ordinary operation. The suggested detection method is based on analyzing temporally consecutive system states via wavelet singular entropy (WSE).
III. CYBER ATTACKS
Cyber Attack refers to the study and understanding of the principles, motivations, techniques, and impacts behind cyber attacks. It encompasses various aspects, including the psychology of attackers, the vulnerabilities of systems, the tools and methods employed in attacks, and the consequences for individuals, organizations, and society at large.
A. Key Components of cyber attack Include
By studying cyber attack, cybersecurity professionals can better anticipate, detect, and mitigate threats, ultimately enhancing the resilience of systems and networks in the face of evolving cyber threats.
Let's break down each of these types of cyber attacks that our model is going to detect:
1) Bot Attack
Description: A Bot Attack involves the use of automated software applications, known as bots, to perform malicious activities on target systems or networks. These bots are often controlled remotely by an attacker and can carry out a variety of tasks, such as spreading malware, conducting DDoS attacks, or harvesting sensitive data.
Example: Deploying a botnet—a network of compromised computers or devices—to launch a coordinated DDoS attack against a target website, overwhelming its resources and making it inaccessible to legitimate users.
6. Bruteforce Attack
Description: A Brute Force Attack is a trial-and-error method used by attackers to guess usernames, passwords, or encryption keys. Attackers systematically try all possible combinations until the correct one is found. It's an exhaustive approach that relies on the attacker's computational power and time.
Example: Attempting to gain unauthorized access to an online account by trying multiple combinations of passwords until the correct one is found.
Each of these attacks poses distinct challenges and requires specific countermeasures for mitigation. Common defense mechanisms include implementing firewalls, intrusion detection systems (IDS), intrusion prevention systems (IPS), rate limiting, access controls, and employing techniques to identify and block malicious traffic. Additionally, maintaining up-to-date software patches and educating users about cybersecurity best practices can help mitigate the risk of successful attacks.
IV. PROPOSED METHODOLOGY
3. In addition to signature-based detection, machine learning and statistical analysis play a pivotal role in anomaly detection systems. These advanced techniques enable the identification of deviations from normal behavior within the network or system, flagging suspicious activities that may indicate a cyber attack.
4. Analysis in cyber attack detection involves leveraging predefined rules or algorithms to scrutinize network traffic, system logs, and other data sources for anomalous patterns or activities. By continuously monitoring for deviations from established norms, security teams can promptly detect and respond to potential threats before they escalate.
5. Implementing a comprehensive incident response plan is essential for effectively managing and mitigating the impact of cyber attacks. This includes establishing clear procedures for incident detection, analysis, containment, eradication, and recovery. Continuous monitoring of systems and networks, coupled with real-time threat intelligence feeds, enhances the organization's ability to detect and respond to emerging threats promptly.
6. To stay ahead of evolving cyber threats, organizations must prioritize the regular updating, testing, and refinement of their detection methodologies. This iterative process ensures that detection systems remain effective in identifying new attack vectors, adapting to changing tactics employed by malicious actors, and mitigating emerging cyber threats effectively. By embracing a proactive and adaptive approach to cyber attack detection, organizations can strengthen their cybersecurity posture and mitigate the risks posed by today's dynamic threat landscape.
V. FEATURES DISCRIPTION
VIII. AKNOWLEDGEMENT
We extend our heartfelt appreciation to our Director, Prof. Y.R. Soman, Principal Dr. Sandeep Kadam, HOD Prof. Sagar Rajebhosale, Project Guide Prof. Prakash Kshirsagar, and Project Co-guide Prof. Vrushali Wankhede for entrusting us with the opportunity to undertake this project and for their invaluable guidance and support throughout its duration. From the project's inception to its culmination, they provided steadfast encouragement, expert insights, and constructive feedback that significantly contributed to its success. Their unwavering dedication to nurturing learning and fostering innovation has been a constant source of motivation. We are truly grateful for the privilege of working under the guidance of Prof. Prakash Kshirsagar. Their wealth of knowledge, patience, and commitment to excellence not only enriched the project but also deepened our understanding of the subject matter.
IX. AKNOWLEDGEMENT We extend our heartfelt appreciation to our Director, Prof. Y.R. Soman, Principal Dr. Sandeep Kadam, HOD Prof. Sagar Rajebhosale, Project Guide Prof. Prakash Kshirsagar, and Project Co-guide Prof. Vrushali Wankhede for entrusting us with the opportunity to undertake this project and for their invaluable guidance and support throughout its duration. From the project\\\'s inception to its culmination, they provided steadfast encouragement, expert insights, and constructive feedback that significantly contributed to its success. Their unwavering dedication to nurturing learning and fostering innovation has been a constant source of motivation. We are truly grateful for the privilege of working under the guidance of Prof. Prakash Kshirsagar. Their wealth of knowledge, patience, and commitment to excellence not only enriched the project but also deepened our understanding of the subject matter.
[1] S. Xin, Q. Guo, H. Sun, B. Zhang, J. Wang, and C. Chen, “Cyber-physical modeling and cyber-contingency assessment of hierarchical control systems,” IEEE Trans. Smart Grid, vol. 6, no. 5, pp. 2375–2385, Sep. 2021 [2] A. R. Javed, M. O. Beg, M. Asim, T. Baker, and A. H. Al-Bayatti, “AlphaLogger: Detecting motion-based side-channel attack using smartphone keystrokes,” J. Ambient Intell. Humanized Comput., pp. 1–14, Feb. 2020 [3] K. Zetter. (2020, Mar.). Inside the cunning, unprecedented hack of Ukraine’s power grid. [Online]. Available: https://wired.com [4] Y. Yang, L. Wu, G. Yin, L. Li, and H. Zhao, “A survey on security and privacy issues in Internet-of-Things,” IEEE Internet Things [5] pp. 1250–1258, Oct. 2021.3. 5 H. Karimipour and V. Dinavahi, “Extended Kalman filter-based parallel dynamic state estimation,” IEEE Trans. Smart Grid, vol. [6] no. 3, pp. 1539–1549, May 2019. 6 M. P. Barrett, “Framework for improving critical infrastructure cybersecurity, version 1.1,” NIST Nat. Inst. Standards Technol., Gaithersburg, MD, USA, Tech. Rep. CSWP 04162018, Apr. 2020. [7] M. Dehghani, M. Ghiasi, T. Niknam, A. Kavousi-Fard, and S. Padmanaban, “False data injection attack detection based on Hilbert-huang transform in AC smart islands,” IEEE Access, vol. 8, pp. 179002–179017, 2020. [8] K. Chatterjee, V. Padmini, and S. Khaparde, “Review of cyber attacks on power system operations,” in Proc. IEEE Region Symp. (TENSYMP), Jul. 2020, pp. 1–6
Copyright © 2024 Prof. Prakash Kshirsagar , Prof. Vrushali Wankhede , Abhijeet Hingane , Pankaj Kadam, Rutuja Patil, Harshali Tolkar. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
Paper Id : IJRASET60466
Publish Date : 2024-04-16
ISSN : 2321-9653
Publisher Name : IJRASET
DOI Link : Click Here