• Login
    • Login
    Advanced Search
    View Item 
    •   Maseno IR Home
    • Journal Articles
    • School of Computing and informatics
    • Department of Computer science
    • View Item
    •   Maseno IR Home
    • Journal Articles
    • School of Computing and informatics
    • Department of Computer science
    • View Item
    JavaScript is disabled for your browser. Some features of this site may not work without it.

    Detecting Remote Access Network Attacks Using Supervised Machine Learning Methods

    Thumbnail
    View/Open
    IJCNIS-V15-N2-Cover.pdf (169.4Kb)
    Publication Date
    2023-04-01
    Author
    Ndichu, Samuel
    McOyowo, Sylvester
    Okoyo, Henry
    Wekesa, Cyrus
    Metadata
    Show full item record
    Abstract/Overview
    Remote access technologies encrypt data to enforce policies and ensure protection. Attackers leverage such techniques to launch carefully crafted evasion attacks introducing malware and other unwanted traffic to the internal network. Traditional security controls such as anti-virus software, firewall, and intrusion detection systems (IDS) decrypt network traffic and employ signature and heuristic-based approaches for malware inspection. In the past, machine learning (ML) approaches have been proposed for specific malware detection and traffic type characterization. However, decryption introduces computational overheads and dilutes the privacy goal of encryption. The ML approaches employ limited features and are not objectively developed for remote access security. This paper presents a novel ML-based approach to encrypted remote access attack detection using a weighted random forest (W-RF) algorithm. Key features are determined using feature importance scores. Class weighing is used to address the imbalanced data distribution problem common in remote access network traffic where attacks comprise only a small proportion of network traffic. Results obtained during the evaluation of the approach on benign virtual private network (VPN) and attack network traffic datasets that comprise verified normal hosts and common attacks in real-world network traffic are presented. With recall and precision of 100%, the approach demonstrates effective performance. The results for k-fold cross-validation and receiver operating characteristic (ROC) mean area under the curve (AUC) demonstrate that the approach effectively detects attacks in encrypted remote access network traffic, successfully averting attackers and network intrusion
    Permalink
    https://repository.maseno.ac.ke/handle/123456789/5811
    Collections
    • Department of Computer science [62]

    Maseno University. All rights reserved | Copyright © 2022 
    Contact Us | Send Feedback

     

     

    Browse

    All of Maseno IRCommunities & CollectionsBy Issue DateAuthorsTitlesSubjectsThis CollectionBy Issue DateAuthorsTitlesSubjects

    My Account

    LoginRegister

    Statistics

    View Usage Statistics

    Maseno University. All rights reserved | Copyright © 2022 
    Contact Us | Send Feedback