Page 266 - Artificial Intelligence in the Age of Neural Networks and Brain Computing
P. 266

258    CHAPTER 12 Computational Intelligence in the Time




                            Various software products are available to implement the second level of
                         security. However, there is still plenty of room to design machine learningebased
                         algorithms to identify malwares and detect unknown cyberattacks using zero-day
                         vulnerability. Many approaches have been proposed so far in this direction, for
                         example, see Refs. [20,21] for details.
                            The third security layer is also very important and can be seen at the application
                         level. Usually, the number of new malware victims gradually increase, infection then
                         rapidly spreads following some triggering events associated with malware evolution
                         (the open source code of the malware is made available), and, finally, we end up in a
                         pandemic situation. Early detection of malware can mitigate the infection, as
                         presented in the next subsection Case Study.

                         6.2 CASE STUDY: DARKNET ANALYSIS TO CAPTURE MALICIOUS
                             CYBERATTACK BEHAVIORS
                         In order to protect users from cyber threats, it is important to characterize mal-
                         ware behavior, with malware instances caught both within one’s local network
                         domain and the Internet as a whole. A classification system can then be designed
                         to monitor the current system behavior in order to detect cyberattacks. One way
                         to observe large-scale events taking place on the Internet is to design a network
                         probe inspecting activity in the darknet.The darknetisdefinedasa setofunused
                         address-space of a computer network which should not be used and, as such, not
                         have any normal communication with other computers. Following the definition,
                         it comes out that almost all communication traffic along the darknet is therefore
                         suspicious; by inspecting such a traffic, we can grasp information related to
                         cyberattacks. Observable cyberattacks are mainly activities of random scanning
                         worms and DDoS backscatter messages. However, since the darknet can receive
                         packets from the whole Internet space, by operating in the darknet we can monitor
                         the large-scale malicious activities on the whole Internet.
                            Fig. 12.3 shows the darknet traffic patterns representing two cases of typical
                         malicious behaviors: (A) DDoS attacks and (B) scanning. The vertical axes of the
                         plots represent the port number of a source host and a destination IP (darknet
                         side). The horizontal axis is divided into two parts: the left one refers to the time
                         needed to send a packet from a source host while the right half refers to the
                         destination IP. Therefore, the plot shows that a packet of a certain host is delivered
                         from a port number on the left vertical axis at a certain time on the left horizontal
                         axis and it reaches a destination host with IP on the right horizontal axis and a
                         port number on the right vertical axis. Traffic patterns differ depending on the nature
                         of cyberattacks. For instance, Fig. 12.3 shows a typical DDoS attack and a typical
                         scanning activity.
   261   262   263   264   265   266   267   268   269   270   271