Next Article in Journal
Wearable Robotic Gait Training in Persons with Multiple Sclerosis: A Satisfaction Study
Next Article in Special Issue
Retrospective IP Address Geolocation for Geography-Aware Internet Services
Previous Article in Journal
Fast Beam Training Technique for Millimeter-Wave Cellular Systems with an Intelligent Reflective Surface
Previous Article in Special Issue
Contextualized Filtering for Shared Cyber Threat Information
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Towards a Machine Learning Based Situational Awareness Framework for Cybersecurity: An SDN Implementation

by
Yannis Nikoloudakis
1,2,
Ioannis Kefaloukos
2,*,
Stylianos Klados
2,
Spyros Panagiotakis
2,
Evangelos Pallis
2,
Charalabos Skianis
1 and
Evangelos K. Markakis
2
1
Department of Information & Communications Systems Engineering, University of the Aegean, Neo Karlovasi, 83200 Samos, Greece
2
Electrical and Computer Engineering Department, Hellenic Mediterranean University, Herakleion, 71410 Crete, Greece
*
Author to whom correspondence should be addressed.
Sensors 2021, 21(14), 4939; https://doi.org/10.3390/s21144939
Submission received: 29 June 2021 / Revised: 14 July 2021 / Accepted: 15 July 2021 / Published: 20 July 2021
(This article belongs to the Collection Cyber Situational Awareness in Computer Networks)

Abstract

:
The ever-increasing number of internet-connected devices, along with the continuous evolution of cyber-attacks, in terms of volume and ingenuity, has led to a widened cyber-threat landscape, rendering infrastructures prone to malicious attacks. Towards addressing systems’ vulnerabilities and alleviating the impact of these threats, this paper presents a machine learning based situational awareness framework that detects existing and newly introduced network-enabled entities, utilizing the real-time awareness feature provided by the SDN paradigm, assesses them against known vulnerabilities, and assigns them to a connectivity-appropriate network slice. The assessed entities are continuously monitored by an ML-based IDS, which is trained with an enhanced dataset. Our endeavor aims to demonstrate that a neural network, trained with heterogeneous data stemming from the operational environment (common vulnerability enumeration IDs that correlate attacks with existing vulnerabilities), can achieve more accurate prediction rates than a conventional one, thus addressing some aspects of the situational awareness paradigm. The proposed framework was evaluated within a real-life environment and the results revealed an increase of more than 4% in the overall prediction accuracy.

1. Introduction

According to a recent European’s Union Agency for Cybersecurity (ENISA) report [1], a 54% increase was reported in the total number of data breaches by midyear 2019, compared to 2018. In addition, 71% of the reported data breaches were financially motivated. Additionally, according to ENISA’s “Threat Landscape 2020—Information Leakage” report [2], organizations experienced an 11% increase in disclosures compared with 2018, while in 2019 there were 2.013 confirmed data disclosures [3].
One of the most common ways to handle cyber-attacks, as identified by ENISA, is Intrusion Detection Systems (IDS) [4,5,6], but their limitations impair their effectiveness against several malicious activities. One major limitation is that most of these systems utilize only a certain type of data as input (e.g., NetFlow v5 data) to perform their predictions/detections. The complexity and heterogeneity of current infrastructures render these systems obsolete since, to achieve a holistic operational environment awareness and provide more accurate predictions, the ingestion of diverse data, gathered from various sources, is required.
The situational awareness (SA) paradigm seems to be a very promising approach in the cybersecurity domain since it dictates the collection, fusion, and assessment of heterogeneous information from the operational environment to make predictions about possible risks, such as cyber-attacks. In more detail, according to Endsley et al. [7], situational awareness is the ability to gather data from the surrounding environment, capture temporal and spatial incidents, assess their significance, and make predictions on their forthcoming condition. While these processes were initially identified for military applications, Bass Tim [8,9] first stated that the future of cybersecurity lies in the application of the situational awareness theorem. He recommended that the next generation of intrusion detection systems should fuse data from heterogeneous sources for the creation of cyberspace situational awareness.
In consideration of the above, situational awareness in cybersecurity allows network administrators and security analysts to gather heterogeneous data, such as network traffic data and discovered vulnerabilities, to gain a more thorough understanding of the surrounding environment. On top of that, the interpretation of that information provides insight and knowledge of the network, while assisting in the predictions about the foreseeable future [10].
Situational awareness within the cybersecurity domain has been approached in various ways in the literature [11]. Some authors propose novel data-fusion methods for heterogeneous data, while others propose machine learning (ML) techniques, to automate the SA assessment process.
Even though all those approaches propose novel exploitation methods for the situational awareness paradigm in the cybersecurity domain, they only address specific steps of the SA process, such as data collection and analysis. Moreover, they offer semi-automated or completely manual solutions, thus requiring human interaction to a great extent. Finally, towards addressing these issues, this paper introduces an automated situational awareness for cybersecurity framework that collects and assesses hosts’ environmental data (namely real-time network flows) along with discovered vulnerabilities (vulnerability assessment results [12]), to predict imminent cyber-attacks on network-enabled assets (entities). In more detail, the proposed framework monitors, detects, and assesses existing and newly introduced network-enabled entities against tens of thousands of well-known reported vulnerabilities. It produces a classification score based on the standardized Common Vulnerability Scoring System (CVSS V3.1) [13] and finally assigns each entity to a connectivity-appropriate layer 3 network slice, by utilizing the SDN controller. Thereafter, an ML-based IDS, trained with an enhanced dataset (network flows and common vulnerabilities and exposures—CVEs identifiers), continuously monitors the assessed entities, and detects ongoing attacks, by fusing, in real-time, their network flows and the vulnerability assessment results of each host.
The results of our evaluation experiments illustrated that the proposed ML-based enhanced IDS is more efficient by more than 4% in terms of prediction accuracy, compared to typical ML-based IDS, which is solely trained with network data.
The rest of this paper is structured as follows. Section 2 presents the state of the art regarding vulnerability assessment, intrusion detection systems, and situational awareness in the ICT domain. Section 3 presents the implementation details of the proposed framework. Section 4 elaborates on the performance evaluation procedure and the experimental results. Finally, Section 5 concludes this paper with a brief discussion on the outcomes of this research and the presentation of the foreseen future steps.

2. State of the Art

Several research initiatives and studies have been conducted concerning the utilization of the situational awareness paradigm within the cybersecurity domain. In this section, we will present the most prevalent ones that outline the current landscape.
As described by NIST [14], the cybersecurity lifecycle consists of five discrete steps, namely, Identify, Protect, Detect, Respond, and Recover. Most of the existing research endeavors focus only on one of those steps, while the remaining four most of the time are either not handled, or addressed in a non-automated manner.
Within the context of risk identification, (first step—Identify), S. Lee et al. proposed a security assessment framework, specifically designed for software defined networking (SDN) [15]. The framework utilizes the SDN paradigm to identify entities within its infrastructure. Consequently, the framework produces attack scenarios and initiates security assessment procedures at the discovered entities within the underlying network, using penetration tests.
In addition, techniques of automated random data generation for input (fuzzing techniques) are deployed to detect potential unknown attack scenarios. Similarly, Nikoloudakis et al., in [16] leveraging the SDN paradigm, developed a vulnerability assessment framework for private networks, wherein it automatically assesses newly introduced and existing network-enabled entities against known vulnerabilities. Furthermore, the proposed framework, as a protection action assigns the network-enabled entities to a connectivity-appropriate VLAN according to their vulnerability status (CVSS score). F. Loi et al. [17] proposed a suite consisting of security tests. The security tests entail assessments on (i) Confidentiality (whether the data is in plaintext, encoded, or encrypted), (ii) Integrity (checks for replay attacks and DNS security), (iii) Access Control and Availability (DoS attacks), and (iv) Reflection (malformed packets that send ICMP messages, SSDP broadcasts, and SNMP requests). Furthermore, taking public networks into consideration, E. T. Tchao et al. [18] presented an assessment framework that was evaluated on a University campus, using the Bring Your Own Device (BYOD) paradigm. In their paper, they proposed a multi-faceted authentication model to recognize patterns and usual threats to alert the network administrator. A solid contribution for security enforcement in the IoT domain, IoT Sentinel, was proposed by M. Miettinen et al. in [19]. IoT Sentinel restricts communications between vulnerable devices and attackers. It identifies the devices’ types and uses a vulnerability database to discover their vulnerabilities. In contradiction to our proposed framework, most of the aforementioned research endeavors focus only on the Identify section of the cybersecurity lifecycle, and most of them even refrain from taking any action after the assessment.
Some research initiatives have approached situational awareness with the use of machine learning. A recurrent neural network (RNN) was developed for an anomaly-based IDS from Li et al. [20]. The RNN is trained to identify network anomalies and enforce control policies, which by utilizing the benefits of the SDN paradigm. X. Liu et al. in [21,22] presented a prototype of a multiclass support vector machine (SVM)-based fusion engine. Their outcomes suggest that the SVMs have potential in real-time IDS applications, due to the faster results and reliability of the SVM approach. Additionally, Thaseen et al. [23] proposed a random tree model, reaching an increase in prediction accuracy and reducing the false alarm rate, whereas Zhang et al. [24] proposed data augmentation using a generative adversarial network (GAN). The GAN model generated data similar to the KDD99 dataset [25]. This dataset allowed the detection model to identify not only attacks, but attack variants as well. These initiatives, apart from utilizing outdated datasets, also refrain from fusing other kinds of data and only ingest and assess network data.
Finally, several studies have tried to approach cyber-situational awareness by fusing information from the operational environment. More specifically. M. L. Matthews et al. in [26] presented a cooperative procedure to achieve situational awareness in a cybersecurity context. Their system comprised a collaborative situation-aware intrusion detection system (IDS) that collects data from separate sensors. The data aggregation is performed with the help of a custom ontology, specifically designed for the fusion of heterogeneous data, resulting in a knowledge base. A recent approach from Y. Zhang et al. [27] presented a visual analysis framework that provides cyber-situational awareness. Their proposed framework provides visual analysis of the network topology. Moreover, with dynamic queries, the security analyst can filter out specific network features that are shown. In addition to those approaches, H. Park et al. [28] suggested an alternative course of action for cyber-situational awareness by combining regular expressions and their own proposed evaluation methodology to overcome the limited string-based matching that most signature-pattern matching algorithms use. The collection of the regular expressions that create detection rules is expandable and coordinated by each security analyst who utilizes the framework.
E. Dynikova et al. [29] addressed cyber-situational awareness with a mathematical/probabilistic approach. They applied risk assessment techniques to calculate attack risk levels for a specific entity and offer some countermeasures for individual attack sequences. Similarly, H. Wang et al. in [30] utilized a quantification method to enhance cyber-situational awareness. Analytic hierarchy process [31,32], along with D-S evidence theory [33], was utilized to fuse multi-source data, and eventually streamline the cyber-situational assessment process. Finally, T. Jirsik et al. in [34,35] approached situational awareness in a more traditional manner. They introduced a new and enhanced way to analyze network flows by taking advantage of the integrated meta-data that IPFIX [36] provides, resulting in a more detailed understanding of the network while eliminating the need for extra parsers, like syslog, due to the extra, non-network data from IPFIX.
The aforementioned initiatives approach situational awareness by fusing data from heterogeneous sources. Nevertheless, all of them refrain from utilizing machine learning techniques to assist in the assessment and prediction process.
As our literature review revealed, some case studies, even though they suggest approaches that include the use of machine learning algorithms, utilize outdated and possibly obsolete training datasets to identify malicious traffic, while others that fuse heterogeneous data to achieve situational awareness abstain from utilizing machine learning techniques, thus limiting the potential of their framework. Furthermore, to the best of our knowledge, the aforementioned initiatives require human intervention to a great extent, thus limiting the responsiveness of their systems.
To address these issues, we present a framework that builds upon the notion of situational awareness, and provides automation in several steps of the cybersecurity lifecycle, thus diminishing human interaction. In more detail, the proposed framework:
  • Discover existing and newly introduced network-enabled entities in real-time by utilizing the SDN paradigm.
  • Performs vulnerability assessment on discovered network-enabled entities using a Vulnerability Assessment as a Service (VAaaS) component.
  • Assigns the assessed entities to a connectivity-appropriate network slice through an SDN controller application, depending on their risk level (vulnerability assessment).
  • Leverages an enhanced dataset, which combines heterogeneous data to train an ML-based IDS, thus achieving more fine-grained classification, and therefore more robust training results.
  • Produce intrusion detection predictions, by utilizing real-time data (Netflow data and system vulnerabilities—CVEs).

3. System Architecture

This section presents the high-level architecture of the proposed framework and elaborates on all internal components and their functionalities (Figure 1). Moreover, the framework’s overall functionality is described by two basic use cases, which relate to steps 1, 2 and 3 of NIST’s cybersecurity lifecycle [37], namely Identify, Protect and Detect, which are also presented in the following subsections.

3.1. Logic Component

The logic component is an over-the-top SDN controller application that facilitates the overall functionalities of the presented framework. Inherently, the logic component is aware of its underlying network topology, in real-time. It instructs the VAaaS component to perform vulnerability assessments on newly introduced entities upon discovery (discovery is performed in real-time). Moreover, previously assessed entities are periodically reassessed in a preconfigured ad hoc manner. Based on the risk level that derives from the vulnerability assessment report (CVSS score), each entity is assigned to a connectivity-appropriate network slice. There are three distinct network slices that represent the entities’ risk-levels. Namely, the “full connectivity” slice, for low risk level (CVSS between 0.1–3.9), the “internet-only” slice for medium risk level (CVSS between 4.0–6.9), and “no-connectivity” slice for high and critical risk level CVSS between 7.0–10.0). Thus, entities with high-risk levels (CVSS score above 7.0 [38]), posing a potential threat to the network, will not be granted network access. The slicing is dynamically enforced by applying all the necessary flow-rules for the target entity on the SDN controller, by the logic component.
Moreover, the logic component also facilitates the fusion and propagation of the appropriate data to the ML-IDS. In more detail, it collects the NetFlow data from the entities, fuses them with the discovered vulnerabilities, if any, for each entity, and sends them to the ML-IDS. In this way, the ML-IDS can perform its prediction. More structured details concerning the functionalities of the component will be presented in the following subsections.

3.2. Vulnerability Assessment as a Service (VAaaS) Component

The VAaaS component exposes a RESTful API, allowing for the programmatic manipulation of its internal functionalities. Therefore, as explained above, the VAaaS component performs vulnerability assessments on each entity the Logic component dictates, and produces an assessment report, containing the discovered vulnerabilities and the overall risk level (CVSS score [39]) of the assessed entity. This report will be used by the Logic component to assign each entity to a connectivity-appropriate network slice. Additionally, the discovered vulnerabilities will be fused with the real-time NetFlow data to be fed to the ML-IDS.

3.3. ML-IDS

3.3.1. Dataset

For the purposes of the evaluation of this research we created two (2) datasets, plain and enhanced, using the features comprised by the CIC-IDS2017 dataset [40] and the data captured from real-life network traffic, within our evaluation environment. In more detail, the plain dataset is similar to the CIC-IDS2017 format, while the enhanced dataset also contains common vulnerabilities and exposures (CVEs) definitions as extra features. Finally, each entry in both datasets were labeled with the name of the specific attack.

3.3.2. ML-Model

The continuous monitoring of the underlying network is performed by the ML-IDS. The ML-IDS component is an intrusion detection system that utilizes a neural network (NN) to accurately detect imminent cyber-attacks. The component’s ML model has been trained with our enhanced dataset. Based on the fact that we have a multiclass classification problem, and according to the literature [41,42,43,44], for the creation of our neural model, we initiated a trial and error procedure, using the Rectified Linear Unit (ReLU) activation function in the hidden layers of our model. However, during the testing procedure, we observed that the Hyperbolic Tangent activation function (Tanh) illustrated a considerable increase in both training and test accuracy compared to ReLU. Therefore, the Tanh activation function was selected. For the output layer of the model, we used the SoftMax function. For the purposes of this study, and since this is a proof-of-concept framework, the dataset only included five easily reproducible attacks. The attacks that were used were Elasticsearch Remote File Inclusion Attack, Manage Engine Remote Desktop Attack, WordPress Ninja Forms Attack, OpenSSH Server Service Brute Force Attack, and Denial of Service Slow Loris Attack. The ML-IDS’s neural network is exposed through the TensorFlow Serving [45] component, by exposing a RESTful API, allowing for programmatic manipulation of the neural model.

3.4. Use Cases

The presented framework’s overall functionality is described by two fundamental use cases. The first use case concerns the first and second steps of the cybersecurity lifecycle, i.e., “Identify” and “Protect”. The second one concerns the third step of the cybersecurity lifecycle, “Detect”. In the second use case, we try to approach the notion of situational awareness within the cybersecurity domain by fusing heterogeneous and seemingly uncorrelated data from various sources, to gain awareness of the operational environment in real-time, and produce predictions, as accurate as possible, concerning the immediate future, e.g., predict an imminent attack on a specific entity.

3.4.1. Identification and Protection Use Case

As briefly described in the previous subsections, the first use case involves the identification of vulnerabilities on entities and the proactive measures to protect the system from possible implications imposed by vulnerable entities, which is a rather straightforward procedure. The Logic component, since it is developed as an SDN controller application, detects newly introduced entities in real-time. Thus, upon detection, it probes the VAaaS component with the discovered entities’ IPs to initiate a vulnerability assessment on each one of them. Consequently, the VAaaS component performs the assessments, a somewhat time-consuming procedure, produces detailed reports, and sends them back to the Logic component. These reports contain a list of the discovered vulnerabilities on each entity, and the overall score of the assessment, which is based on the standardized CVSS V3.0 score and classifies the entity into one of the specified risk levels: “Critical” (9.0–10), “High” (7.0–8.9), “Medium” (4.0–6.9), and “Low” (0.1–3.9). Consequently, the Logic component receives the reports and depending on the assessment results (CVSS V3.0 score), assigns each entity to a connectivity appropriate network slice, by applying the appropriate flow-rules on the SDN controller. Three self-explanatory network slices have been developed, slice#1, no-connectivity, slice#2, internet-only, and slice#3, full-connectivity. As one can infer, the ML-IDS component does not partake in this use case. A conceptual representation of the use case is depicted in Figure 2.

3.4.2. Detection Use Case

In this use case, the VAaaS component does not partake, since the vulnerability assessment procedure has already been completed and has provided the Logic component with the vulnerability assessment reports. Consequently, the Logic component starts collecting the network flows from each entity, through the OpenFlow protocol (packet-in). It then fuses the network data with the corresponding vulnerabilities and sends it to the ML-IDS component. Finally, the ML-IDS component produces a prediction on whether an attack is taking place on an entity, and what is the name of that attack. A conceptual representation of the use case is depicted in Figure 3.

4. Evaluation

To evaluate the presented framework, we performed several measurements within a real-life environment to assess the overall prediction precision (Equation (1)) of the ML-IDS, i.e., the precision of the internal neural network, which is the outcome of the enhanced custom-made dataset. In more detail, the situational awareness framework was deployed on our Lab’s premises, wherein the internal network is managed by an SDN controller. Therein, we also deployed a virtual machine with the appropriate vulnerabilities, so that we can reproduce the specific cyber-attacks, which our framework was trained to detect. The following subsections present the results of this evaluation process.

4.1. Aim

The scope of this evaluation is to assess the overall precision of the neural network of our proposed ML-IDS. Precision is defined as the number of correctly predicted attacks out of all the performed attacks, which can be estimated by dividing the sum of correct predictions by the sum of total predictions, as demonstrated in Equation (1).
Precision = Correct   Predictions All   Predictions

4.2. Method

The evaluation process is a two-fold procedure. For the first phase, we assess the precision of the ML model, trained with the enhanced dataset, hereafter called “enhanced model”. For the second phase, we assess the same values for the ML model, which was trained with a typical dataset, hereafter called “plain model”.
For each phase, the Logic component gathers and fuses the real-time network traffic (network flows) for each discovered entity and its discovered vulnerabilities, into a format that the trained model accepts (NumPy array). Then, the ML-IDS produces a prediction based on the input, whether an attack is in progress, and which attack. For the purposes of demonstration, and since this is a proof-of-concept implementation, the neural network was trained for five (5) specific attacks. More specifically, an Elasticsearch-specific Remote File Inclusion (RFI) attack (CVE-2014-3120) [46] (Attack #1), a ManageEngine Desktop Central 9-specific RFI attack (CVE-2015-8249) [47] (Attack #2), a WordPress-specific RFI attack (CVE-2016-1209) [48] (Attack #3), an SSH Brute-Force attack (CVE-2001-0553) [49] (Attack #4), and finally a Slow Loris DoS attack (CVE-2007-6750) [50] (Attack #5).

4.3. Variables

4.3.1. Dependent

The dependent variable for this evaluation experiment is the precision of each prediction. The values collected for each model were assessed and compared with each other. This allowed us to gain a more detailed assessment, of the effectiveness of each respective model.

4.3.2. Independent

For this evaluation experiment, we required only one independent variable, which was the type of the attack. During the experiment, we performed all the attacks the models were trained, mentioned in the Section 4.2.

4.3.3. Fixed

The fixed variables for this experiment were the total duration for each respective attack. In more detail, each attack was performed for thirty seconds.

4.4. Prediction

The assumption that we are trying to prove is that the enhanced model will generate a greater precision rate on an identical cyber-threat incident than the plain model.

4.5. Results

Table 1 depicts the correlation between the attacks and their attack number. Both Table 2 and Figure 4 illustrate the difference in prediction precision between the two models, while Table 3 illustrates the confusion matrix for the enhanced dataset.

4.6. Discussion

Both models are compared in Table 1, regarding their precision in predicting each of the attacks mentioned in the previous subsection. The first row represents the precision scores of the plain model, while the second row represents the precision values of the enhanced model.
Results signify that the enhanced model produces higher prediction accuracy results on all of the attacks. The mean precision for the plain model is ~83%, and for the enhanced model it is ~87%. The enhanced model demonstrates an increased precision of more than 4%. The graphical comparison of the two models is depicted in Figure 4.
To summarize, the enhanced model outperformed the plain model in all the attacks. Nevertheless, during the second and third attacks, even though the enhanced model correctly predicted the attack, the prediction rates for both models were rather low. This phenomenon is somewhat expected since the premise which upon both models were trained, was to classify and detect attacks based on their network footprint, meaning the deviations in network “behavior” during specific attacks. Thus, when an attack produces a small footprint, it makes it even harder for such kinds of neural models to achieve high prediction precisions.

4.7. Evaluation

The presented evaluation showcases and compares the variable efficiency a neural network model has on two different occasions. Firstly, when it is trained with a plain network traffic dataset, and then when it is trained with an enhanced dataset. The results were decisive for that comparison. Even so, the experiment’s variables could be modified further for even better results. From our perspective, concerning the neural network model, more algorithms could be tested, to produce even higher prediction precision. Furthermore, the enhanced model produces higher prediction precision on all of the attacks, in comparison with the plain model. However, the method utilized for the creation of that dataset could be revised, since it now allows the model to perform better, but if the number of attacks increases, it might not perform as well, since the dimensionality of the dataset will change, leading to an increase in false positives/false negatives. Further investigation is required to efficiently fuse such kind of heterogeneous data to offer scalability to the framework.

5. Conclusions

In this paper, we presented an automated framework that addresses the first three steps of the cybersecurity lifecycle, as defined by NIST (Identify, Protect and Detect). The presented framework performs vulnerability assessment on network-enabled entities in the network (Identify), assigns each entity to a connectivity-appropriate network slice (Protect), and finally continuously monitors the underlying infrastructure with an ML-based IDS, utilizing the situational awareness paradigm (Detect). The ML-IDS has been trained with a custom enhanced dataset that contains network data (NetFlow) and CVEs.
The framework was evaluated through a series of experiments, within a real-world environment comprising a minimum set of CVEs for proof of concept purposes. The evaluation results indicated the increased prediction performance of the presented ML-IDS in comparison with a normal ML-based IDS. Although the results look promising, we aim at testing alternative algorithms for the enhancement of our neural model, and further research and examine the dataset creation procedure. Our goal is to create a dataset containing as many attacks as possible.

Author Contributions

Conceptualization, Y.N., I.K., S.K., S.P., E.P., C.S. and E.K.M.; Supervision, E.K.M.; Validation, S.K.; Writing—original draft, I.K.; Writing—review and editing, Y.N., I.K., S.P., E.P., C.S. and E.K.M. All authors have read and agreed to the published version of the manuscript.

Funding

This research initiative has received funding from the European Union’s Horizon 2020 Framework Programme for Research and Innovation, with Title H2020-SHAPES under grant agreement no. 857159.

Institutional Review Board Statement

Not applicable.

Informed Consent Statement

Not applicable.

Data Availability Statement

Not applicable.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. ENISA Threat Landscape 2020—Data Breach. Available online: https://www.enisa.europa.eu/publications/enisa-threat-landscape-2020-data-breach (accessed on 16 July 2021).
  2. ENISA Threat Landscape 2020—Information Leakage. Available online: https://www.enisa.europa.eu/publications/information-leakage (accessed on 16 July 2021).
  3. Staffa, M.; Sgaglione, L.; Mazzeo, G.; Coppolino, L.; D’Antonio, S.; Romano, L.; Gelenbe, E.; Stan, O.; Carpov, S.; Grivas, E.; et al. An openNCP-based solution for secure ehealth data exchange. J. Netw. Comput. Appl. 2018, 116, 65–85. [Google Scholar] [CrossRef]
  4. Spanos, G.; Giannoutakis, K.M.; Votis, K.; Viano, B.; Augusto-Gonzalez, J.; Aivatoglou, G.; Tzovaras, D. A Lightweight Cyber-Security Defense Framework for Smart Homes. In Proceedings of the 2020 International Conference on INnovations in Intelligent SysTems and Applications (INISTA), Novi Sad, Serbia, 24–26 August 2020; p. 120137. [Google Scholar]
  5. Markakis, E.; Nikoloudakis, Y.; Mastorakis, G.; Mavromoustakis, C.X.; Pallis, E.; Sideris, A.; Zotos, N.; Antic, J.; Cernivec, A.; Fejzic, D.; et al. Acceleration at the edge for supporting smes security: The FORTIKA paradigm. IEEE Commun. Mag. 2019, 57, 41–47. [Google Scholar] [CrossRef]
  6. Sutton, R.; Ludwiniak, R.; Pitropakis, N.; Chrysoulas, N.; Dagiuklas, T. Towards an SDN Assisted IDS. In Proceedings of the 2021 11th IFIP International Conference on New Technologies, Mobility and Security (NTMS), Paris, France, 19–21 April 2021. [Google Scholar]
  7. Endsley, M.R. Toward a theory of situation awareness in dynamic systems. Hum. Factors 1995, 37, 32–64. [Google Scholar] [CrossRef]
  8. Bass, T. Multisensor Data Fusion for Next Generation Distributed Intrusion Detection Systems. Irish Natl. Symp. 1999, 28, 24–27. [Google Scholar] [CrossRef]
  9. Bass, T. Intrusion detection systems and multisensor data fusion. Commun. ACM 2000, 43, 99–105. [Google Scholar] [CrossRef]
  10. Tsolakis, A.; Moschos, I.; Votis, K.; Ioannidis, D.; Dimitrios, T.; Pandey, P.; Katsikas, S.; Kotsakis, E.; Garcia-Castro, R. A secured and trusted demand response system based on blockchain technologies. In Proceedings of the 2018 Innovations in Intelligent Systems and Applications (INISTA), Thessaloniki, Greece, 3–5 July 2018. [Google Scholar]
  11. Pitropakis, N.; Panaousis, E.; Giannakoulias, A.; Kalpakis, G.; Rodriguez, R.D.; Sarigiannidis, P. An Enhanced Cyber Attack Attribution Framework. In International Conference on Trust and Privacy in Digital Business; Springer: Cham, Switzerland, 2018; pp. 213–228. [Google Scholar]
  12. Markakis, E.; Nikoloudakis, Y.; Pallis, E.; Manso, M. Security assessment as a service cross-layered system for the adoption of digital, personalised and trusted healthcare. In Proceedings of the 2019 IEEE 5th World Forum on Internet of Things (WF-IoT), Limerick, Ireland, 15–18 April 2019; pp. 91–94. [Google Scholar]
  13. First.org. CVSS V3.1. Available online: https://www.first.org/cvss/ (accessed on 16 July 2021).
  14. NIST. Cybersecurity Framework. Available online: https://www.nist.gov/news-events/news/2018/04/nist-releases-version-11-its-popular-cybersecurity-framework (accessed on 13 February 2021).
  15. Lee, S.; Yoon, C.; Lee, C.; Shin, S.; Yegneswaran, V.; Porras, P. DELTA: A security assessment framework for software-defined networks. In Proceedings of the 2014 Network and Distributed System Security Symposium 2017, San Diego, CA, USA, 26 February–1 March 2017. [Google Scholar]
  16. Nikoloudakis, Y.; Pallis, E.; Mastorakis, G.; Mavromoustakis, C.X.; Skianis, C.; Markakis, E.K. Vulnerability assessment as a service for fog-centric ICT ecosystems: A healthcare use case. Peer Peer Netw. Appl. 2019, 12, 1216–1224. [Google Scholar] [CrossRef]
  17. Loi, F.; Sivanathan, A.; Gharakheili, H.H.; Radford, A.; Sivaraman, V. Systematically evaluating security and privacy for consumer iot devices. In Proceedings of the 2017 Workshop on Computing Within Limits 2017, Santa Barbara, CA, USA, 22–24 June 2017; Volume 1, pp. 1–6. [Google Scholar]
  18. Tchao, E.T.; Ansah, R.Y.; Djane, S.D. Barrier free internet access: Evaluating the cyber security risk posed by the adoption of bring your own devices to e-learning network infrastructure. Int. J. Comput. Appl. 2017, 176, 53–62. [Google Scholar]
  19. Miettinen, M.; Marchal, S.; Hafeez, I.; Frassetto, T.; Asokan, N.; Sadeghi, A.-R.; Tarkoma, S. IoT sentinel demo: Automated device-type identification for security enforcement in IoT. In Proceedings of the 2017 IEEE 37th International Conference on Distributed Computing Systems (ICDCS), Atlanta, GA, USA, 5–8 June 2017; pp. 2511–2514. [Google Scholar]
  20. Li, H.; Wei, F.; Hu, H. Enabling dynamic network access control with anomaly-based IDS and SDN. In Proceedings of the 2019 ACM International Workshop on Security in Software Defined Networks & Network Function Virtualization—SDN-NFVSec ’19, Richardson, TX, USA, 27 March 2019; pp. 13–16. [Google Scholar]
  21. Liu, X.-W.; Wang, H.-Q.; Liang, Y.; Lai, J.-B. Heterogeneous multi-sensor data fusion with multi-class support vector machines: Creating network security situation awareness. In Proceedings of the 2007 International Conference on Machine Learning and Cybernetics, Hong Kong, China, 19–22 August 2007; pp. 2689–2694. [Google Scholar]
  22. Liu, X.; Wang, H.; Lai, J.; Liang, Y.; Yang, C. Multiclass support vector machines theory and its data fusion application in network security situation awareness. In Proceedings of the 2007 International Conference on Wireless Communications, Networking and Mobile Computing, Shanghai, China, 21–25 September 2007; pp. 6343–6346. [Google Scholar]
  23. Thaseen, S.; Kumar, C.A. An analysis of supervised tree based classifiers for intrusion detection system. In Proceedings of the 2013 International Conference on Pattern Recognition, Informatics and Mobile Engineering, Salem, India, 21–22 February 2013; pp. 294–299. [Google Scholar]
  24. Zhang, H.; Yu, X.; Ren, P.; Luo, C.; Min, G. Deep adversarial learning in intrusion detection: A data augmentation enhanced framework. arXiv 2019, arXiv:1901.07949. [Google Scholar]
  25. Srivastava, S.K.; Sharma, Y.K.; Kumar, S. Characteristics categorization dataset KDD Cup’99. AIP Conf. Proc. 2019, 2142, 110034. [Google Scholar] [CrossRef]
  26. Mathews, M.; Halvorsen, P.; Joshi, A.; Finin, T. A collaborative approach to situational awareness for cybersecurity. In Proceedings of the 8th International Conference on Collaborative Computing: Networking, Applications and Worksharing 2012, Pittsburgh, PA, USA, 14–17 October 2012; pp. 216–222. [Google Scholar]
  27. Zhang, Y.; Zhang, J.; Zhang, B. Visual analysis of cybersecurity situational awareness. In Proceedings of the 2019 IEEE 10th International Conference on Software Engineering and Service Science (ICSESS), Beijing, China, 18–20 October 2019; pp. 685–688. [Google Scholar]
  28. Park, H.K.; Kim, M.S.; Park, M.; Lee, K. Cyber situational awareness enhancement with regular expressions and an evaluation methodology. In Proceedings of the MILCOM 2017–2017 IEEE Military Communications Conference (MILCOM), Baltimore, MD, USA, 23–25 October 2017; pp. 406–411. [Google Scholar]
  29. Doynikova, E.; Kotenko, I. CVSS-based probabilistic risk assessment for cyber situational awareness and countermeasure selection. In Proceedings of the 2017 25th Euromicro International Conference on Parallel, Distributed and Network-based Processing (PDP), St. Petersburg, Russia, 6–8 March 2017; pp. 346–353. [Google Scholar]
  30. Wang, H.; Chen, Z.; Feng, X.; Di, X.; Liu, D.; Zhao, J.; Sui, X. Research on network security situation assessment and quantification method based on analytic hierarchy process. Wirel. Pers. Commun. 2018, 102, 1401–1420. [Google Scholar] [CrossRef]
  31. Saaty, T.L. What is the analytic hierarchy process? In Mathematical Models for Decision Support; Springer: Berlin/Heidelberg, Germany, 1988; Volume 15, pp. 109–121. [Google Scholar]
  32. Saaty, T.L. Decision making with the analytic hierarchy process. Int. J. Serv. Sci. 2008, 1, 83. [Google Scholar] [CrossRef] [Green Version]
  33. Zadeh, L.A. Simple view of the dempster-shafer theory of evidence and its implication for the rule of combination. AI Mag. 1986, 7, 85–90. [Google Scholar]
  34. Irsik, T.; Celeda, P. Cyber situation awareness via IP flow monitoring. In Proceedings of the NOMS 2020—2020 IEEE/IFIP Network Operations and Management Symposium, Budapest, Hungary, 20–24 April 2020; pp. 1–6. [Google Scholar]
  35. Jirsik, T.; Celeda, P. Toward real-time network-wide cyber situational awareness. In Proceedings of the NOMS 2018—2018 IEEE/IFIP Network Operations and Management Symposium, Taipei, Taiwan, 23–27 April 2018; pp. 1–7. [Google Scholar]
  36. Specification of the IP Flow Information Export (IPFIX) Protocol for the Exchange of Flow Information. Available online: http://www.ietf.org/rfc/rfc7011.txt (accessed on 16 July 2021).
  37. NIST’s Cybersecurity Lifecycle. Available online: https://www.nist.gov/cyberframework/online-learning/five-functions (accessed on 16 July 2021).
  38. Common Vulnerability Scoring System version 3.1: Specification Document. Available online: https://www.first.org/cvss/specification-document (accessed on 16 July 2021).
  39. CVSS v3.0 Calculator. Available online: https://www.first.org/cvss/calculator/3.0 (accessed on 16 July 2021).
  40. Sharafaldin, I.; Lashkari, A.H.; Ghorbani, A.A. Toward generating a new intrusion detection dataset and intrusion traffic characterization. In Proceedings of the ICISSP 2018, Madeira, Portugal, 22–24 January 2018; pp. 108–116. [Google Scholar]
  41. Brownlee, J. Better deep learning: Train faster, reduce overfitting, and make better predictions. In Machine Learning Mastery; Packt: Birmingham, UK; O’Reilly: Sebastopol, CA, USA, 2018. [Google Scholar]
  42. Brownlee, J. Master machine learning algorithms: Discover How They Work and Implement Them from Scratch. In Machine Learning Mastery; Packt: Birmingham, UK; O’Reilly: Sebastopol, CA, USA, 2018. [Google Scholar]
  43. Brownlee, J. Supervised and unsupervised machine learning algorithms. In Machine Learning Mastery; Packt: Birmingham, UK; O’Reilly: Sebastopol, CA, USA, 2018. [Google Scholar]
  44. Brownlee, J. Deep learning with python: Develop deep learning models on theano and tensorflow using keras. In Machine Learning Mastery; Packt: Birmingham, UK; O’Reilly: Sebastopol, CA, USA, 2018. [Google Scholar]
  45. TensorFlow Serving Models. Available online: https://www.tensorflow.org/tfx/guide/serving (accessed on 16 July 2021).
  46. CVE-2014-3120. Available online: https://nvd.nist.gov/vuln/detail/CVE-2014-3120 (accessed on 16 July 2021).
  47. CVE-2015-8249. Available online: https://nvd.nist.gov/vuln/detail/CVE-2015-8249 (accessed on 16 July 2021).
  48. CVE-2016-1209. Available online: https://nvd.nist.gov/vuln/detail/CVE-2016-1209 (accessed on 16 July 2021).
  49. CVE-2001-0553. Available online: https://nvd.nist.gov/vuln/detail/CVE-2001-0553 (accessed on 16 July 2021).
  50. CVE-2007-6750. Available online: https://nvd.nist.gov/vuln/detail/CVE-2007-6750 (accessed on 16 July 2021).
Figure 1. System architecture.
Figure 1. System architecture.
Sensors 21 04939 g001
Figure 2. Identification use case conceptual diagram.
Figure 2. Identification use case conceptual diagram.
Sensors 21 04939 g002
Figure 3. Detection use case conceptual diagram.
Figure 3. Detection use case conceptual diagram.
Sensors 21 04939 g003
Figure 4. Precision of predictions for both IDSs for all attacks.
Figure 4. Precision of predictions for both IDSs for all attacks.
Sensors 21 04939 g004
Table 1. Attack–attack Number Correlation.
Table 1. Attack–attack Number Correlation.
AttackAttack Number
Remote File Inclusion (RFI) attackAttack #1
ManageEngine Desktop Central 9-specific RFI attackAttack #2
WordPress-specific RFI attackAttack #3
SSH Brute-Force attackAttack #4
Slow Loris DoS attackAttack #5
Table 2. Models’ predictions’ precision on live attacks.
Table 2. Models’ predictions’ precision on live attacks.
PrecisionAttack #1Attack #2Attack #3Attack #4Attack #5Standard DeviationMean
Plain model86.4266.8075.9295.0190.8610.2983.00
Enhanced Model95.5568.9679.1998.0694.8211.3387.32
Delta9.132.153.273.053.961.044.31
Table 3. Confusion matrix for enhanced dataset.
Table 3. Confusion matrix for enhanced dataset.
True/PredictedElasticManage EngineWordpressSSHSlowloris
Elastic38700018
ManageEngine01640020
Wordpress00288340
SSH004181910
Slowloris1874722877
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Share and Cite

MDPI and ACS Style

Nikoloudakis, Y.; Kefaloukos, I.; Klados, S.; Panagiotakis, S.; Pallis, E.; Skianis, C.; Markakis, E.K. Towards a Machine Learning Based Situational Awareness Framework for Cybersecurity: An SDN Implementation. Sensors 2021, 21, 4939. https://doi.org/10.3390/s21144939

AMA Style

Nikoloudakis Y, Kefaloukos I, Klados S, Panagiotakis S, Pallis E, Skianis C, Markakis EK. Towards a Machine Learning Based Situational Awareness Framework for Cybersecurity: An SDN Implementation. Sensors. 2021; 21(14):4939. https://doi.org/10.3390/s21144939

Chicago/Turabian Style

Nikoloudakis, Yannis, Ioannis Kefaloukos, Stylianos Klados, Spyros Panagiotakis, Evangelos Pallis, Charalabos Skianis, and Evangelos K. Markakis. 2021. "Towards a Machine Learning Based Situational Awareness Framework for Cybersecurity: An SDN Implementation" Sensors 21, no. 14: 4939. https://doi.org/10.3390/s21144939

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop