Ijraset Journal For Research in Applied Science and Engineering Technology
Authors: Anand Pashupatimath, Nandini Singh, Spoorthi Bellary, Venugopal K M, Shifhali Bhat
DOI Link: https://doi.org/10.22214/ijraset.2024.60342
Certificate: View Certificate
In cyber security, APT stands for Advanced Persistent Threat. It refers to advanced and long-term cyber-attacks where an attacker gains unauthorized access to a network and remains invisible for a long period of time. APTs are difficult to detect and require a comprehensive security strategy that includes threat intelligence, technical intelligence, and continuous monitoring to effectively mitigate risk. This paper introduces a different approach to APT prevention by integrating advanced threat intelligence, machine learning algorithms, and proactive defense mechanisms. Our approach uses real-time data analysis, anomaly detection and behavioral profiling to identify potential threats early in their lifecycle. Our implementation focuses on the development of a real-time network intrusion detection system (NIDS) using a combination of Flask, SocketIO, and ML techniques. The system is designed to monitor and analyze network traffic in real-time, identify potential intrusion attempts, and provide timely alerts to system administrators by combining packet capture and analysis with machine learning-based classification and real-time alerting via a web interface. This research contributes to the ongoing efforts in cybersecurity by providing an effective and innovative defence mechanism against the persistent and sophisticated nature of modern cyber threats.
I. INTRODUCTION
Now-a-days, data security is receiving increased attention from security experts, businesses, and even governmental agencies. All organizations, particularly those in critical sectors like the military and other well- established groups, are now obligated to implement robust security measures that were once considered optional.
However, given the rapid emergence of new malware strains and sophisticated attack methods, staying ahead of cyber threats has become gradually challenging. Despite significant efforts to enhance security, various attacks continue to pose significant risks, aiming to cause harm or achieve financial gain. One prevalent form of cyber threat that has gained prominence in recent years is Advanced Persistent Threats (APTs)
A. What is APT?
B. Lifecycle of APT
1 shows the 7 stages of APT attack lifecycle. Each stage is crucial for comprehending APT tactics and devising effective defence mechanisms.
II. LITERATURE SURVEY
III. IMPLEMENTATION
Our approach focuses on the development of a real- time network intrusion detection system (NIDS) using a combination of Flask, SocketIO, and ML techniques. The system is designed to monitor and analyze network traffic in real-time, identify potential intrusion attempts, and provide timely alerts to system administrators.
A. Key Components
B. Functionality
C. Deployment and Scalability
Our approach is being designed to be deployable in various network environments, ranging from small- scale local networks to large enterprise networks. The modular architecture of the system allows for easy scalability and customization to meet specific requirements.
IV. APPROACH
Initially, we began with a basic concept as depicted in Figure 2. Our approach involves monitoring network traffic to identify any malicious packets traversing the IP or the network. We aim to detect any emerging data that could pose a threat to the entire network or compromise its integrity by comparing it against predefined parameters established using a dataset of previous attacks.
Understanding the components of figure 2-
Figure 3 shows the model we are trying to implement. Enhancing the fundamental concept, we introduce a model comprising two main components:
A. Model Training Process
In this phase, we initially acquire the CICIDS 2018 and SCVIC-APT datasets and preprocess them. Subsequently, we employ a supervised learning algorithm, specifically Random Forest, to train the preprocessed dataset. The objective is to detect known attacks and discern patterns within the data. Once the model is trained, it transitions to the ML model phase of the other component.
B. Real Time APT Detection System:
This component consists of 9 phases
V. RESULTS
Figure 4 constitutes a real-time Advanced Persistent Threat (APT) detection system implemented using Flask, SocketIO, and Scapy in Python. The system captures network traffic and packets, filters data, and performs feature extraction to generate flow records. These flow records are then classified using machine learning models, which include an autoencoder for anomaly detection and a Random Forest classifier for threat classification. Additionally, the system utilizes Lime for explainability and risk assessment. Detected threats are logged along with their associated risk levels. The system also visualizes flow details and risk assessment reports through a web interface. Through these integrated functionalities, the system offers a comprehensive approach to network security monitoring and threat detection.
In summary, our implementation demonstrates the effectiveness of integrating Flask, SocketIO, and machine learning techniques for real-time network intrusion detection. By combining these technologies, we have developed a robust and scalable NIDS capable of providing proactive protection against network- based threats. By leveraging Scapy for packet capture, feature extraction, and preprocessing, coupled with machine learning models for real-time classification, the system demonstrates its capability to identify and mitigate potential security threats effectively. Through detailed logging and risk assessment functionalities, the system provides actionable insights into detected threats, facilitating prompt response and remediation efforts. Overall, the implementation of this APT detection system underscores the importance of integrating advanced techniques in packet analysis, machine learning, and real-time alerting to bolster network security and mitigate the risks posed by sophisticated and persistent cyber threats. It does not guarantee to detect APT always but is our approach to solve it. Lot of study still has to be done to achieve it.
[1] Poirot: Causal Correlation Aided Semantic Analysis for Advanced Persistent Threat Detection | IEEE Journals & Magazine | IEEE Xplore [2] https://ieeexplore.ieee.org/abstract/document/9392 626 [3] https://journals.riverpublishers.com/index.php/JW E/article/view/5577 [4] https://www.mdpi.com/2076-3417/9/6/1055 [5] https://ieeexplore.ieee.org/document/7926977 [6] https://ieeexplore.ieee.org/document/8606252 [7] https://www.sciencedirect.com/science/article/abs/ pii/S1084804517303569?via%3Dihub [8] https://www.researchgate.net/publication/3272890 93 [9] https://www.researchgate.net/publication/3205827 21 [10] https://link.springer.com/article/10.1007/s42979- [11] 023-01744-xhttps://www.sciencedirect.com/science/article/pii/ S1877050919304041 [12] https://ieeexplore.ieee.org/document/7460498?de nied [13] https://ieeexplore.ieee.org/document/7511197 [14] https://documents.trendmicro.com/assets/wp/wp- detecting-apt-activity-with-network-traffic- analysis.pdf [15] https://hindawi.com/journals/mpe/2017/4916953/ [16] https://ieeexplore.ieee.org/document/8835390
Copyright © 2024 Anand Pashupatimath, Nandini Singh, Spoorthi Bellary, Venugopal K M, Shifhali Bhat. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
Paper Id : IJRASET60342
Publish Date : 2024-04-15
ISSN : 2321-9653
Publisher Name : IJRASET
DOI Link : Click Here