IRMA-International.org: Creator of Knowledge
Information Resources Management Association
Advancing the Concepts & Practices of Information Resources Management in Modern Organizations

A Black-Box Framework for Malicious Traffic Detection in ICT Environments

A Black-Box Framework for Malicious Traffic Detection in ICT Environments
View Sample PDF
Author(s): Carlos Alberto M. S. Teles (Federal Center for Technological Education of Rio de Janeiro (CEFET-RJ), Brazil), Carlos Roberto Gonçalves Viana Filho (Federal Center for Technological Education of Rio de Janeiro (CEFET-RJ), Brazil)and Felipe da Rocha Henriques (Federal Center for Technological Education of Rio de Janeiro (CEFET-RJ), Brazil)
Copyright: 2021
Pages: 20
Source title: Handbook of Research on Cyber Crime and Information Privacy
Source Author(s)/Editor(s): Maria Manuela Cruz-Cunha (Polytechnic Institute of Cávado and Ave, Portugal)and Nuno Mateus-Coelho (Lusófona University, Portugal)
DOI: 10.4018/978-1-7998-5728-0.ch001

Purchase

View A Black-Box Framework for Malicious Traffic Detection in ICT Environments on the publisher's website for pricing and purchasing information.

Abstract

Information security is gradually becoming an area that plays an important role in our daily lives as information and communications technology assets grow with increasingly connected environments. Increasingly we have information from society having their data leaked due to information security flaws in both hardware and software of ICT assets. To identify failures of ICT assets, through the detection of malicious traffic, this chapter proposes a black-box-based framework that aims to detect malicious traffic. The black-box method allows monitor the network without accessing the software or hardware details. In the proposed framework, information security and network resource usage are used together in order to provide a reliable detection of malicious traffic. Firstly, the authors collected network traffic information, generating a dataset from open source networking tools. The proposed detection scheme can identify risks and threats like malware, suspect traffic, and others. The scheme was validated verifying the correlation between network security alerts and network resource usage.

Related Content

Chaymaâ Boutahiri, Ayoub Nouaiti, Aziz Bouazi, Abdallah Marhraoui Hsaini. © 2024. 14 pages.
Imane Cheikh, Khaoula Oulidi Omali, Mohammed Nabil Kabbaj, Mohammed Benbrahim. © 2024. 30 pages.
Tahiri Omar, Herrou Brahim, Sekkat Souhail, Khadiri Hassan. © 2024. 19 pages.
Sekkat Souhail, Ibtissam El Hassani, Anass Cherrafi. © 2024. 14 pages.
Meryeme Bououchma, Brahim Herrou. © 2024. 14 pages.
Touria Jdid, Idriss Chana, Aziz Bouazi, Mohammed Nabil Kabbaj, Mohammed Benbrahim. © 2024. 16 pages.
Houda Bentarki, Abdelkader Makhoute, Tőkési Karoly. © 2024. 10 pages.
Body Bottom