Multi-Layer Mapping of Cyberspace for Intrusion Detection

Sicong Shao, Pratik Satam, Shalaka Satam, Khalid Al-Awady, Gregory Ditzler, Salim Hariri, Cihan Tunc

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

The ubiquity and vulnerability of computer applications make them ideal places for intrusion attacks that increase in intensity and complexity. Computer applications have a relationship with various networks, physical components, host devices, and users with different roles and requirements. Therefore, securing computer applications in such a complex and dynamic cyberspace is urgent and challenging. This paper attempts to tackle the challenges by proposing a Multi-Layer Abnormal Behaviors Analysis (MLABA) framework for intrusion detection associated with three layers (i.e., system, process, and network layers) in cyberspace for characterizing their normal operations and detect any abnormal behavior that might be triggered by malicious activities. The proposed technique was evaluated on several popular applications (i.e., Firefox, Opera, Chrome, and Ruby). The experimental results demonstrate the feasibility of MLABA framework that can detect the intrusion and abuse for applications.

Original languageEnglish (US)
Title of host publication2021 IEEE/ACS 18th International Conference on Computer Systems and Applications, AICCSA 2021 - Proceedings
PublisherIEEE Computer Society
ISBN (Electronic)9781665409698
DOIs
StatePublished - 2021
Event18th IEEE/ACS International Conference on Computer Systems and Applications, AICCSA 2021 - Virtual, Online, Morocco
Duration: Nov 30 2021Dec 3 2021

Publication series

NameProceedings of IEEE/ACS International Conference on Computer Systems and Applications, AICCSA
Volume2021-December
ISSN (Print)2161-5322
ISSN (Electronic)2161-5330

Conference

Conference18th IEEE/ACS International Conference on Computer Systems and Applications, AICCSA 2021
Country/TerritoryMorocco
CityVirtual, Online
Period11/30/2112/3/21

ASJC Scopus subject areas

  • Computer Networks and Communications
  • Computer Science Applications
  • Hardware and Architecture
  • Signal Processing
  • Control and Systems Engineering
  • Electrical and Electronic Engineering

Fingerprint

Dive into the research topics of 'Multi-Layer Mapping of Cyberspace for Intrusion Detection'. Together they form a unique fingerprint.

Cite this