Abstract

Fractal and multifractal analysis can help to discover the structure of the communication system, and in particular the pattern and characteristics of traffic, in order to understand the threats better and detect anomalies in network operation. The massive increase in the amount of data transmitted by different devices makes these systems the target of various types of attacks by cybercriminals. This article presents the use of fractal analysis in detecting threats and anomalies. The issues related to the construction and functioning of the Security Operations Centre (SOC) are presented. To examine the correctness of SOC, several attacks on virtual systems located in the network were carried out, such as Denial of Service (DoS) attack, brute force, malware infections, exploits. Based on data collected from monitoring and devices, the response to the event was analyzed, and multifractal spectra of network traffic before and during the incident were created. The collected information allows us to verify the theses and confirm the effectiveness of multifractal methods in detecting anomalies in the operation of any Information and Communication Technology (ICT) network. Such solutions will contribute to the development of advanced intrusion detection systems (IDS).

Highlights

  • The security and privacy of online services have many challenges and problems that are still open to research

  • Similar results are presented in [12]; their experimental results show that the proposed methods can achieve over 90 percent hit rate and precision when determining the number of attackers

  • The ever‐increasing number of users and the reach of the internet is connected with the constant development of new technologies or their partial change

Read more

Summary

Introduction

The security and privacy of online services have many challenges and problems that are still open to research. Security and privacy issues are still a significant challenge. Work anomalies can cause severe privacy and security issues when providing a service. In the era of rapid technological development related to information technology, the number and complexity of threats to the security of computer systems or networks are growing. Organizations that have information technology (IT) systems take the necessary steps to counteract any threats to computer and network resources efficiently. In many cases, it becomes necessary to use external services or create a Security Operation Center (SOC), which is the security management center in the organization. The primary mission of an SOC is to actively counteract all threats and analyze them in case of a security incident [2,3]

Methods
Results
Conclusion
Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.