Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
research-article

A Flow-based Multi-agent Data Exfiltration Detection Architecture for Ultra-low Latency Networks

Published: 16 July 2021 Publication History

Abstract

Modern network infrastructures host converged applications that demand rapid elasticity of services, increased security, and ultra-fast reaction times. The Tactile Internet promises to facilitate the delivery of these services while enabling new economies of scale for high fidelity of machine-to-machine and human-to-machine interactions. Unavoidably, critical mission systems served by the Tactile Internet manifest high demands not only for high speed and reliable communications but equally, the ability to rapidly identify and mitigate threats and vulnerabilities. This article proposes a novel Multi-Agent Data Exfiltration Detector Architecture (MADEX), inspired by the mechanisms and features present in the human immune system. MADEX seeks to identify data exfiltration activities performed by evasive and stealthy malware that hides malicious traffic from an infected host in low-latency networks. Our approach uses cross-network traffic information collected by agents to effectively identify unknown illicit connections by an operating system subverted. MADEX does not require prior knowledge of the characteristics or behavior of the malicious code or a dedicated access to a knowledge repository. We tested the performance of MADEX in terms of its capacity to handle real-time data and the sensitivity of our algorithm’s classification when exposed to malicious traffic. Experimental evaluation results show that MADEX achieved 99.97% sensitivity, 98.78% accuracy, and an error rate of 1.21% when compared to its best rivals. We created a second version of MADEX, called MADEX level 2, that further improves its overall performance with a slight increase in computational complexity. We argue for the suitability of MADEX level 1 in non-critical environments, while MADEX level 2 can be used to avoid data exfiltration in critical mission systems. To the best of our knowledge, this is the first article in the literature that addresses the detection of rootkits real-time in an agnostic way using an artificial immune system approach while it satisfies strict latency requirements.

References

[1]
A. K. Abbas, A. H. H. Lichtman, and S. Pillai. 2017. Cellular and Molecular Immunology E-Book. Elsevier Health Sciences. Retrieved from https://books.google.co.uk/books?id=L4FUDgAAQBAJ.
[2]
Shabnam Aboughadareh and Christoph Csallner. 2016. Detecting rootkits with the RAI runtime application inventory. In Proceedings of the 6th Workshop on Software Security, Protection, and Reverse Engineering (SSPREW’16). ACM, 1–12.
[3]
Atif Ahmad, Jeb Webb, Kevin C. Desouza, and James Boorman. 2019. Strategically motivated advanced persistent threat: Definition, process, tactics and a disinformation model of counterattack. Comput. Secur. 86 (2019), 402–418.
[4]
A. Aijaz and M. Sooriyabandara. 2019. The Tactile Internet for industries: A review. Proc. IEEE 107, 2 (2019), 414–435.
[5]
Wathiq Laftah Al-Yaseen, Zulaiha Ali Othman, and Mohd Zakree Ahmad Nazri. 2017. Real-time multi-agent system for an adaptive intrusion detection system. Pattern Recog. Lett. 85 (2017), 56–64.
[6]
Vishwa Teja Alaparthy and Salvatore Domenic Morgera. 2018. A multi-level intrusion detection system for wireless sensor networks based on immune theory. IEEE Access 6 (2018), 47364,47373.
[7]
Sahar Aldhaheri, Daniyal Alghazzawi, Li Cheng, Bander Alzahrani, and Abdullah Al-Barakati. 2020. DeepDCA: Novel network-based detection of IoT attacks using artificial immune system. Appl. Sci. 10 (03 2020), 1909.
[8]
Abdelhamied A. Ateya, Ammar Muthanna, Irina Gudkova, Anastasia Vybornova, and Andrey Koucheryavy. 2017. Intelligent core network for Tactile Internet system. In Proceedings of the International Conference on Future Networks and Distributed Systems (ICFNDS’17). Association for Computing Machinery, New York, NY.
[9]
Shahram Behzad. 2018. An artificial immune based approach for detection and isolation misbehavior attacks in wireless networks. J. Comput. (2018), 705–720.
[10]
Z. Berkay Celik, R. J. Walls, P. McDaniel, and A. Swami. 2015. Malware traffic detection using tamper resistant features. In Proceedings of the IEEE Military Communications Conference. 330–335.
[11]
Pieter Burghouwt, Marcel Spruit, and Henk Sips. 2015. Detection of Botnet command and control traffic by the identification of untrusted destinations. In Proceedings of the International Conference on Security and Privacy in Communication Networks, Jing Tian, Jiwu Jing, and Mudhakar Srivatsa (Eds.). Springer International Publishing, Cham, 174–182.
[12]
Andrew Carlin, Mohammad Hammoudeh, and Omar Aldabbas. 2015. Intrusion detection and countermeasure of virtual cloud systems-state of the art and current challenges. Int. J. Adv. Comput. Sci. Applic. 6, 6 (2015).
[13]
Aniello Castiglione, Roberto De Prisco, Alfredo De Santis, Ugo Fiore, and Francesco Palmieri. 2014. A botnet-based command and control approach relying on swarm intelligence. J. Netw. Comput. Applic. 38 (2014), 22–33.
[14]
Paulo André Castro and Jaime Simão Sichman. 2013. Automated asset management based on partially cooperative agents for a world of risks. Appl. Intell. 38, 2 (Mar. 2013), 210–225.
[15]
T. Cejka, V. Bartos, M. Svepes, Z. Rosa, and H. Kubatova. 2016. NEMEA: A framework for network traffic analysis. In Proceedings of the 12th International Conference on Network and Service Management (CNSM’16). 195–201.
[16]
Milan Čermák, Pavel Čeleda, and Jan Vykopal. 2014. Detection of DNS traffic anomalies in large networks. In Advances in Communication Networking, Yvon Kermarrec (Ed.). Springer International Publishing, Cham, 215–226.
[17]
S. Sibi Chakkaravarthy, D. Sangeetha, and V. Vaidehi. 2019. A survey on malware analysis and mitigation techniques. Comput. Sci. Rev. 32 (2019), 1–23.
[18]
Jiageng Chen, Chunhua Su, Kuo-Hui Yeh, and Moti Yung. 2018. Special Issue on Advanced Persistent Threat. https://doi.org/10.1016/j.future.2017.11.005
[19]
B. Claise, B. Trammell, and P. Aitken. 2013. Specification of the IP Flow Information Export (IPFIX) Protocol for the Exchange of IP Traffic Flow Information. RFC 7011 (Internet Standard). Retrieved from https://www.ietf.org/rfc/rfc7011.txt.
[20]
Anne Collinot, Alexis Drogoul, and Philippe Benhamou. 1996. Agent oriented design of a soccer robot team. In Proceedings of the 2nd International Conference on Multi-agent Systems (ICMAS’96). 41–47.
[21]
Michael Coppola. 2013. Accessed 14 Apr. 2020. Suteresu: An LKM rootkit targeting Linux 2.6/3.x on x86(64), and ARM. Retrieved from https://github.com/mncoppola.
[22]
F. M. David, E. M. Chan, J. C. Carlyle, and R. H. Campbell. 2008. Cloaker: Hardware supported rootkit concealment. In Proceedings of the IEEE Symposium on Security and Privacy (SP’08). IEEE, 296–310.
[23]
Leandro De Castro and Jon Timmis. 2002. Artificial Immune Systems: A New Computational Intelligence Approach. Springer-VerlagLondon. https://www.springer.com/gp/book/9781852335946.
[24]
Eric Diehl. 2016. Law 1: Attackers will Always Find Their Way. Springer International Publishing, Cham, 1–43.
[25]
El-Sayed M. El-Alfy. 2019. Nature-inspired Cyber Security and Resiliency: Fundamentals, Techniques and Applications.Institution of Engineering and Technology. https://books.google.co.uk/books/about/Nature_Inspired_Cyber_Security_and_Resil.html?id=vzqUDwAAQBAJ&source=kp_book_description&redir_esc=y.
[26]
G. Epiphaniou, P. Pillai, M. Bottarelli, H. Al-Khateeb, M. Hammoudeh, and C. Maple. 2020. Electronic regulation of data sharing and processing using smart ledger technologies for supply-chain security. IEEE Trans. Eng. Manag. (2020), 1–15. https://doi.org/10.1109/TEM.2020.2987113
[27]
J. Doyne Farmer, Norman H. Packard, and Alan S. Perelson. 1986. The immune system, adaptation, and machine learning. Phys. D: Nonlin. Phenom. 22, 1 (1986), 187–204.
[28]
Diogo A. B. Fernandes, Mário M. Freire, Paulo A. P. Fazendeiro, and Pedro R. M. Inácio. 2017. Applications of artificial immune systems to computer security: A survey. J. Inf. Secur. Applic. 35 (2017), 138–159.
[29]
Martin Fischer. 2017. Accessed 14 Apr. 2020. r77 Rootkit: Ring 3 Rootkit DLL. Retrieved from https://github.com/bytecode77/r77-rootkit.
[30]
R. Geetha Ramani and S. Suresh Kumar. 2019. Nonvolatile kernel rootkit detection using cross-view clean boot in cloud computing. Concurr. Computat.: Pract. Exper. 33, 3 (2019). https://browzine.com/libraries/1684/journals/12613/issues/379973128?showArticleInContext=doi%3A10.1002%2Fcpe.5239.
[31]
Giovanni Giacobbi. 1995. Accessed 14 Apr. 2020. The GNU netCat Project. Retrieved from https://seclists.org/bugtraq/1995/Oct/28.
[32]
Julie Greensmith. 2007. The Dendritic Cell Algorithm. Ph.D. Dissertation. Citeseer. University of Nottingham.
[33]
Julie Greensmith and Uwe Aickelin. 2010. The deterministic dendritic cell algorithm. CoRR abs/1006.1512 (2010).
[34]
Julie Greensmith, Uwe Aickelin, and Steve Cayzer. 2005. Introducing dendritic cells as a novel immune-inspired algorithm for anomaly detection. In Proceedings of the 4th International Conference on Artificial Immune Systems (ICARIS’05). Springer-Verlag, Berlin, 153–167.
[35]
Julie Greensmith, Uwe Aickelin, and Steve Cayzer. 2008. Detecting danger: The dendritic cell algorithm. In Robust Intelligent Systems. Springer Publishing Company, London, 89–112. Retrieved from http://eprints.nottingham.ac.uk/987/.
[36]
Julie Greensmith, Uwe Aickelin, and Gianni Tedesco. 2007. Information fusion for anomaly detection with the dendritic cell algorithm. Inf. Fus. Retrieved from http://eprints.nottingham.ac.uk/570/.
[37]
Mohammad Hammoudeh, Robert Newman, Christopher Dennett, and Sarah Mount. 2013. Interpolation techniques for building a continuous map from discrete wireless sensor network data. Wirel. Commun. Mob. Comput. 13, 9 (2013), 809–827.
[38]
Mohammad Hammoudeh, Robert Newman, Christopher Dennett, Sarah Mount, and Omar Aldabbas. 2015. Map as a service: A framework for visualising and maximising information return from multi-modalwireless sensor networks. Sensors 15, 9 (2015), 22970–23003.
[39]
Zahra Jadidi, Vallipuram Muthukkumarasamy, Elankayer Sithirasenan, and Kalvinder Singh. 2016. A probabilistic sampling method for efficient flow-based analysis. J. Commun. Netw. 18, 5 (2016), 818–825.
[40]
Vicente Julian and Vicente Botti. 2019. Multi-agent systems. Appl. Sci. 9, 7 (Apr. 2019), 1402.
[41]
Simon Kemp. 2019. Accessed 13 Jun. 2019. DIGITAL 2019: GLOBAL DIGITAL OVERVIEW. Retrieved from https://datareportal.com/reports/digital-2019-global-digital-overview.
[42]
Geraldine Lee, Gregory Epiphaniou, Haider Al-Khateeb, and Carsten Maple. 2019. Security and privacy of things: Regulatory challenges and gaps for the secure integration of cyber-physical systems. In Proceedings of the 3rd International Congress on Information and Communication Technology, Xin-She Yang, Simon Sherratt, Nilanjan Dey, and Amit Joshi (Eds.). Springer Singapore, 1–12.
[43]
Linlin Li, Liangxu Sun, and Gang Wang. 2018. An intrusion detection model based on danger theory for wireless sensor networks. Int. J. Online Eng. 14, 9 (2018), 53,65.
[44]
Euripidis Loukis, Yannis Charalabidis, and Leif Skiftenes Flak. 2019. Introduction to the minitrack on towards government 3.0: Disruptive ICTs, advanced policy informatics/analytics and government as a platform. In Proceedings of the 52nd Hawaii International Conference on System Sciences.
[45]
P. Matzinger. 1994. Tolerance, danger, and the extended family. Ann. Rev. Immunol. 12, 1 (1994), 991–1045.
[46]
Nikola Milosevic, Ali Dehghantanha, and Kim-Kwang Raymond Choo. 2017. Machine learning aided Android malware classification. Comput. Electric. Eng. (7 2017).
[47]
Mohamad Farhan Mohamad Mohsin, Azuraliza Abu Bakar, and Abdul Razak Hamdan. 2014. Outbreak detection model based on danger theory. Appl. Soft Comput. J. 24 (2014), 612–622.
[48]
Seyyedeh Atefeh Musavi and Mehdi Kharrazi. 2014. Back to static analysis for kernel-level rootkit detection. IEEE Trans. Inf. Forens. Secur. 9, 9 (2014), 1465–1476.
[49]
P. Narang, S. Ray, C. Hota, and V. Venkatakrishnan. 2014. PeerShark: Detecting peer-to-peer botnets by tracking conversations. In Proceedings of the IEEE Security and Privacy Workshops. 108–115.
[50]
Robert Oates, Graham Kendall, and Jonathan M. Garibaldi. 2008. Frequency analysis for dendritic cell population tuning. Evolut. Intell. 1, 2 (2008), 145–157.
[51]
G. Pellegrino, Q. Lin, C. Hammerschmidt, and S. Verwer. 2017. Learning behavioral fingerprints from netflows using timed automata. In Proceedings of the IFIP/IEEE Symposium on Integrated Network and Service Management (IM’17). 308–316.
[52]
Ilias Raftopoulos. 2014. Extrusion Detection: Monitoring, Detecting, and Characterizing Internal Infections. Ph.D. Dissertation. ETH Zurich.
[53]
G. Ramadhan, Y. Kurniawan, and Chang-Soo Kim. 2016. Design of TCP SYN flood DDoS attack detection using artificial immune systems. In Proceedings of the 6th International Conference on System Engineering and Technology (ICSET’16). 72–76.
[54]
P. Keerthi Reddy, G. Soniya, and K. Ramya Sree. 2019. A novel approach for intrusion detection and prevention system. (2019). https://doi.org/10.32628/CSEIT1952320
[55]
E. M. Rudd, A. Rozsa, M. Günther, and T. E. Boult. 2017. A survey of stealth malware attacks, mitigation measures, and steps toward autonomous open world solutions. IEEE Commun. Surv. Tutor. 19, 2 (2017), 1145–1172.
[56]
Packet Storm Security. Accessed 14 Apr. 2020. cb-r00tkit Rootkit. Retrieved from https://packetstormsecurity.com/files/29877/cb-r00tkit.tgz.html.
[57]
Neda Afzali Seresht and Reza Azmi. 2014. MAIS-IDS: A distributed intrusion detection system using multi-agent AIS approach. Eng. Applic. Artif. Intell. 35 (2014), 286–298.
[58]
Shahaboddin Shamshirband, Nor Badrul Anuar, Miss Laiha Mat Kiah, Vala Ali Rohani, Dalibor Petković, Sanjay Misra, and Abdul Nasir Khan. 2014. Co-FAIS: Cooperative fuzzy artificial immune system for detecting intrusion in wireless sensor networks. J. Netw. Comput. Applic. 42 (2014), 102–117.
[59]
Benjamin Smith, Mohan Rao, Sylvian Crozon, and Niranjan Mayya. 2019. Systems and methods for cyber intrusion detection and prevention. US Patent App. 16/120,745.
[60]
Rabia Tahir. 2018. A study on malware and malware detection techniques. Int. J. Educ. Manag. Eng. 8, 2 (2018), 20.
[61]
Andrew S. Tanenbaum. 2014. Computer Networks (5th ed.), Andrew S. Tanenbaum, David J. Wetherall, Eds.). Pearson, Harlow, Essex.
[62]
A. Tayal, N. Hubballi, and N. Tripathi. 2017. Communication recurrence and similarity detection in network flows. In Proceedings of the IEEE International Conference on Advanced Networks and Telecommunications Systems (ANTS’17). 1–6.
[63]
Donghai Tian, Rui Ma, Xiaoqi Jia, and Changzhen Hu. 2019. A kernel rootkit detection approach based on virtualization and machine learning. IEEE Access 7 (2019), 91657–91666.
[64]
Muhammad Fahad Umer, Muhammad Sher, and Yaxin Bi. 2017. Flow-based intrusion detection: Techniques and challenges. Comput. Secur. 70 (2017), 238–254.
[65]
Lisa Vaas. 2007. Researchers: “Blue pill” rootkit detectable (security researcher working on hypervisor rootkit detection). eWeek (2007). https://www.eweek.com/security/researchers-blue-pill-rootkit-detectable/.
[66]
A. Vance. 2014. Flow based analysis of advanced persistent threats detecting targeted attacks in cloud computing. In Proceedings of the 1st International Scientific-Practical Conference Problems of Infocommunications Science and Technology. 173–176.
[67]
Steven Walker-Roberts, Mohammad Hammoudeh, Omar Aldabbas, Mehmet Aydin, and Ali Dehghantanha. 2019. Threats on the horizon: Understanding security threats in the era of cyber-physical systems. J. Supercomput. (24 Oct. 2019).
[68]
Jianxiong Wang. 2010. A rule-based approach for rootkit detection. In Proceedings of the 2nd IEEE International Conference on Information Management and Engineering, Vol. 3. IEEE, 405–408.
[69]
Mohammad Wazid, Ashok Kumar Das, and Jong-Hyouk Lee. 2019. User authentication in a tactile internet based remote surgery environment: Security issues, challenges, and future research directions. Pervas. Mob. Comput. 54 (2019), 71–85.
[70]
S. Wolfram. 1986. Approaches to complexity engineering. Physica D 22 (Oct. 1986), 385–399.
[71]
Michael Wooldridge. 2009. An Introduction to MultiAgent Systems (2nd ed.). Wiley Publishing.
[72]
Michael Wooldridge and Nicholas R. Jennings. 1995. Intelligent agents: Theory and practice. Knowl. Eng. Rev. 10, 2 (1995), 115–152.
[73]
Meriem Zekri and Labiba Souici-Meslati. 2014. Immunological approach for intrusion detection. https://doi.org/10.46298/arima.1974
[74]
Christian T. Zenger, Jan Zimmer, Mario Pietersz, Benedikt Driessen, and Christof Paar. 2016. Constructive and destructive aspects of adaptive wormholes for the 5G Tactile Internet. In Proceedings of the 9th ACM Conference on Security & Privacy in Wireless and Mobile Networks (WiSec’16). Association for Computing Machinery, New York, NY, 109–120.

Cited By

View all
  • (2024)Threat Detection and Mitigation for Tactile Internet Driven Consumer IoT-Healthcare SystemIEEE Transactions on Consumer Electronics10.1109/TCE.2024.337019370:1(4249-4257)Online publication date: 26-Feb-2024
  • (2024)Ransomware Detection: Ensemble Machine Learning Models Using Disjoint Data2024 IEEE International Conference on Cyber Security and Resilience (CSR)10.1109/CSR61664.2024.10679469(1-6)Online publication date: 2-Sep-2024
  • (2023)Multi-agent Architecture for Passive Rootkit Detection with Data EnrichmentCSEI: International Conference on Computer Science, Electronics and Industrial Engineering (CSEI)10.1007/978-3-031-30592-4_3(29-41)Online publication date: 1-May-2023
  • Show More Cited By

Index Terms

  1. A Flow-based Multi-agent Data Exfiltration Detection Architecture for Ultra-low Latency Networks

      Recommendations

      Comments

      Information & Contributors

      Information

      Published In

      cover image ACM Transactions on Internet Technology
      ACM Transactions on Internet Technology  Volume 21, Issue 4
      November 2021
      520 pages
      ISSN:1533-5399
      EISSN:1557-6051
      DOI:10.1145/3472282
      • Editor:
      • Ling Lu
      Issue’s Table of Contents
      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      Published: 16 July 2021
      Accepted: 01 August 2020
      Revised: 01 July 2020
      Received: 01 April 2020
      Published in TOIT Volume 21, Issue 4

      Permissions

      Request permissions for this article.

      Check for updates

      Author Tags

      1. Artificial immune systems
      2. multi-agent systems
      3. flow-based analysis
      4. rootkits
      5. Tactile Internet

      Qualifiers

      • Research-article
      • Refereed

      Contributors

      Other Metrics

      Bibliometrics & Citations

      Bibliometrics

      Article Metrics

      • Downloads (Last 12 months)30
      • Downloads (Last 6 weeks)5
      Reflects downloads up to 10 Nov 2024

      Other Metrics

      Citations

      Cited By

      View all
      • (2024)Threat Detection and Mitigation for Tactile Internet Driven Consumer IoT-Healthcare SystemIEEE Transactions on Consumer Electronics10.1109/TCE.2024.337019370:1(4249-4257)Online publication date: 26-Feb-2024
      • (2024)Ransomware Detection: Ensemble Machine Learning Models Using Disjoint Data2024 IEEE International Conference on Cyber Security and Resilience (CSR)10.1109/CSR61664.2024.10679469(1-6)Online publication date: 2-Sep-2024
      • (2023)Multi-agent Architecture for Passive Rootkit Detection with Data EnrichmentCSEI: International Conference on Computer Science, Electronics and Industrial Engineering (CSEI)10.1007/978-3-031-30592-4_3(29-41)Online publication date: 1-May-2023
      • (2022)Pivot Attack Classification for Cyber Threat IntelligenceJournal of Information Security and Cybercrimes Research10.26735/ZNTL36395:2(91-103)Online publication date: 3-Oct-2022
      • (2022)Research on Intelligent Detection Method of Automotive Network Data Security Based on FlexRay/CAN GatewayMachine Learning for Cyber Security10.1007/978-3-031-20096-0_30(394-408)Online publication date: 2-Dec-2022
      • (2021)NERD: a Network Exfiltration Rootkit Detector based on a Multi-agent Artificial Immune System2021 Workshop on Communication Networks and Power Systems (WCNPS)10.1109/WCNPS53648.2021.9626241(1-7)Online publication date: 18-Nov-2021
      • (2021)Automatic Malware Categorization Based on K-Means Clustering TechniqueProceedings of the International Conference on Big Data, IoT, and Machine Learning10.1007/978-981-16-6636-0_49(653-664)Online publication date: 4-Dec-2021
      • (2021)Applying Zero Trust Security Principles to Defence Mechanisms Against Data Exfiltration AttacksSecurity and Privacy in the Internet of Things10.1002/9781119607755.ch3(57-89)Online publication date: 3-Dec-2021

      View Options

      Get Access

      Login options

      Full Access

      View options

      PDF

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader

      HTML Format

      View this article in HTML Format.

      HTML Format

      Media

      Figures

      Other

      Tables

      Share

      Share

      Share this Publication link

      Share on social media