• Search Research Projects
  • Search Researchers
  • How to Use
  1. Back to previous page

Study on Cyber-attack Detection based on Automatic Extraction of Multi-dimensional Behavior Modes

Research Project

Project/Area Number 18K11295
Research Category

Grant-in-Aid for Scientific Research (C)

Allocation TypeMulti-year Fund
Section一般
Review Section Basic Section 60070:Information security-related
Research InstitutionKyushu University

Principal Investigator

Feng Yaokai  九州大学, システム情報科学研究院, 助教 (60363389)

Co-Investigator(Kenkyū-buntansha) 櫻井 幸一  九州大学, システム情報科学研究院, 教授 (60264066)
Project Period (FY) 2018-04-01 – 2021-03-31
Project Status Completed (Fiscal Year 2020)
Budget Amount *help
¥4,420,000 (Direct Cost: ¥3,400,000、Indirect Cost: ¥1,020,000)
Fiscal Year 2020: ¥1,170,000 (Direct Cost: ¥900,000、Indirect Cost: ¥270,000)
Fiscal Year 2019: ¥1,300,000 (Direct Cost: ¥1,000,000、Indirect Cost: ¥300,000)
Fiscal Year 2018: ¥1,950,000 (Direct Cost: ¥1,500,000、Indirect Cost: ¥450,000)
Keywords攻撃パターン / パターンの自動抽出 / 検知時の閾値自動調整 / サイバー攻撃 / アンサンブル検知 / シーケンシャル検知 / 2段階検知 / 特徴選択 / Multidimensional Pattern / Two-stage detection / Sequential Detection / Extraction of Threshold / Feature Selection / 多分類器の異常検知 / Automatic Thresholding / Distributed attacks / サイバー攻撃検知 / 通常時挙動パターン / 多次元挙動パターン / 閾値の自動抽出
Outline of Final Research Achievements

1) The necessary features for effective detection of distributed attacks were investigated. 2) Realization and performance verification of a lightweight attack detection system based on machine learning. 3) A new feature selection method was proposed,we proposed a detection system that uses multiple detectors in parallel and demonstrated its performance. 4) Regarding the method of using multiple classifiers in order to maintain the balance of multiple performance indicators for attack detection, the effects of related parameters on the detection performance were investigated and meaningful findings were obtained. 5) We conducted research on the automatic extraction of thresholds for attack detection from multidimensional behavior patterns and the automatic adjustment of the thresholds during detection, and obtained meaningful results.
Based on the research results of this research, seven academic journal papers and 8 domestic/international academic conference papers were published.

Academic Significance and Societal Importance of the Research Achievements

今回の研究で得られた様々な知見は、今後の研究や実際のサイバー攻撃検知システムの設計に役立つ。特には、1) 新しい特徴選択方法を提案し、それを使用して複数の検出器を並列に使用する検出システムの提案; 2) 攻撃検出システムにある複数の性能指標のバランスを保つのは難しい問題を解決するための調査と提案(複数の分類器を使用する順次検出システムのパラメーターの決定法);3) 多次元行動パターンから攻撃検出用閾値を自動抽出し、その自動抽出閾値を検出時に自動的に調整することにより実現した2段階検出方式は、検知システムの軽量化を実現したので、特に IoT 関連のシステムでは重要な知見と考えられている。

Report

(4 results)
  • 2020 Annual Research Report   Final Research Report ( PDF )
  • 2019 Research-status Report
  • 2018 Research-status Report
  • Research Products

    (15 results)

All 2021 2020 2019 2018 Other

All Int'l Joint Research (1 results) Journal Article (5 results) (of which Int'l Joint Research: 3 results,  Peer Reviewed: 5 results,  Open Access: 4 results) Presentation (9 results) (of which Int'l Joint Research: 4 results)

  • [Int'l Joint Research] Universitas Gadjah Mada(インドネシア)

    • Related Report
      2019 Research-status Report
  • [Journal Article] Machine Learning-Based IoT-Botnet Attack Detection with Sequential Architecture2020

    • Author(s)
      Soe Yan Naung、Feng Yaokai、Santosa Paulus Insap、Hartanto Rudy、Sakurai Kouichi
    • Journal Title

      Sensors

      Volume: 20 Issue: 16 Pages: 1-15

    • DOI

      10.3390/s20164372

    • Related Report
      2020 Annual Research Report
    • Peer Reviewed / Open Access / Int'l Joint Research
  • [Journal Article] A Sequential Detection Method for Intrusion Detection System Based on Artificial Neural Networks2020

    • Author(s)
      Hao Zhao, Yaokai Feng, Hiroshi Koide, Kouichi Sakurai
    • Journal Title

      Int. J. Netw. Comput.

      Volume: 10(2) Pages: 213-226

    • NAID

      130007878718

    • Related Report
      2020 Annual Research Report
    • Peer Reviewed / Open Access
  • [Journal Article] Towards a Lightweight Detection System for Cyber Attacks in the IoT Environment Using Corresponding Features2020

    • Author(s)
      Yan Naung Soe, Yaokai Feng, Paulus Insap Santosa 2, Rudy Hartanto and Kouichi Sakurai
    • Journal Title

      Electronics

      Volume: 9(1) Issue: 1 Pages: 1-19

    • DOI

      10.3390/electronics9010144

    • Related Report
      2019 Research-status Report
    • Peer Reviewed / Open Access / Int'l Joint Research
  • [Journal Article] A Sequential Scheme for Detecting Cyber Attacks in IoT Environment2019

    • Author(s)
      Yan Naung Soe, Yaokai Feng, Paulus Insap Santosa, Rudy Hartanto, Kouichi Sakurai
    • Journal Title

      Proc. the 4th IEEE Cyber Science and Technology Congress

      Volume: 2019 Pages: 238-244

    • DOI

      10.1109/dasc/picom/cbdcom/cyberscitech.2019.00051

    • Related Report
      2019 Research-status Report
    • Peer Reviewed / Int'l Joint Research
  • [Journal Article] An ANN Based Sequential Detection Method for Balancing Performance Indicators of IDS2019

    • Author(s)
      Hao Zhao, Yaokai Feng, Hiroshi Koide, Kouichi Sakurai
    • Journal Title

      Proc the 7th International Symposium on Computing and Networking

      Volume: 2019 Pages: 239-244

    • DOI

      10.1109/candar.2019.00039

    • Related Report
      2019 Research-status Report
    • Peer Reviewed / Open Access
  • [Presentation] Detecting DDoS Attack in SDN Environment Using Automatic Thresholding Method2021

    • Author(s)
      Fupei Lyu, Yaokai Feng, Kouichi Sakurai
    • Organizer
      The 38th Symposium on Cryptography and Information Security.
    • Related Report
      2020 Annual Research Report
  • [Presentation] Improving the Two-stage Detection of Cyberattacks in SDN Environment Using Dynamic Thresholding2021

    • Author(s)
      Tao Wang, Yaokai Feng, Kouichi Sakurai
    • Organizer
      The 15th International Conference on Ubiquitous Information Management and Communication
    • Related Report
      2020 Annual Research Report
    • Int'l Joint Research
  • [Presentation] 異なる機械学習アルゴリズムと4つの特徴選択法によるDDoS攻撃検出のパフォーマンス比較2020

    • Author(s)
      秋山仁志、Yaokai Feng、櫻井幸一
    • Organizer
      火の国シンポジウム2020
    • Related Report
      2019 Research-status Report
  • [Presentation] Rule Generation for Signature Based Detection Systems of Cyber Attacks for IoT Environments2019

    • Author(s)
      Yan Naung Soe, Yaokai Feng, Paulus Insap Santosa, Rudy Hartanto, Kouichi Sakurai
    • Organizer
      The 9th International Workshop on Networking, Computing, Systems, and Software (NCSS-9)
    • Related Report
      2019 Research-status Report
  • [Presentation] U2RおよびR2L攻撃の効率的な検出に向けて2019

    • Author(s)
      Hao Zhao、小出 洋、Yaokai Feng、櫻井 幸一
    • Organizer
      火の国情報シンポジウム2019
    • Related Report
      2018 Research-status Report
  • [Presentation] 分散XML処理をための複数経路を用いたルーティングアルゴリズムの提案と評価2019

    • Author(s)
      Longjian Ye、小出 洋、Yaokai Feng、櫻井 幸一
    • Organizer
      火の国情報シンポジウム2019
    • Related Report
      2018 Research-status Report
  • [Presentation] Feature Selection for Machine Learning-Based Early Detection of Distributed Cyber Attacks2018

    • Author(s)
      Yaokai Feng, Hitoshi Akiyama, Liang Lu, Kouichi Sakurai
    • Organizer
      The 4th IEEE Cyber Science and Technology Congress
    • Related Report
      2018 Research-status Report
    • Int'l Joint Research
  • [Presentation] Detecting Distributed Cyber Attacks in SDN Based on Automatic Thresholding2018

    • Author(s)
      Ryousuke Komiya, Yaokai Feng, Kouichi Sakurai
    • Organizer
      The Sixth International Symposium on Computing and Networking
    • Related Report
      2018 Research-status Report
    • Int'l Joint Research
  • [Presentation] Implementing Lightweight IoT-IDS on Raspberry Pi Using Correlation-Based Feature Selection and Its Performance Evaluation2018

    • Author(s)
      Yan Naung Soe, Yaokai Feng, Paulus Insap Santosa, Rudy Hartanto, Kouichi Sakurai
    • Organizer
      The 33rd International Conference on. Advanced Information Networking and Applications
    • Related Report
      2018 Research-status Report
    • Int'l Joint Research

URL: 

Published: 2018-04-23   Modified: 2022-01-27  

Information User Guide FAQ News Terms of Use Attribution of KAKENHI

Powered by NII kakenhi