{"title":"Malicious traffic analysis using Markov chain","authors":"Ryandy Djap, Charles Lim, Kalpin Erlangga Silaen","doi":"10.1145/3557738.3557849","DOIUrl":null,"url":null,"abstract":"A massive increase in cyber attacks during pandemics has made enterprise organizations around the world strive to find new ways to comprehend and detect unknown threats. A firewall has been devised specifically for these tasks, warding off external attacks on the enterprise perimeter network. Our research aims to identify these possible intrusions through firewall traffic analysis based on the Markov chain state transition graph. The research results show that our methods can clearly distinguish malicious traffic from anomaly traffic.","PeriodicalId":178760,"journal":{"name":"Proceedings of the 2022 International Conference on Engineering and Information Technology for Sustainable Industry","volume":"126 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2022-09-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Proceedings of the 2022 International Conference on Engineering and Information Technology for Sustainable Industry","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1145/3557738.3557849","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
A massive increase in cyber attacks during pandemics has made enterprise organizations around the world strive to find new ways to comprehend and detect unknown threats. A firewall has been devised specifically for these tasks, warding off external attacks on the enterprise perimeter network. Our research aims to identify these possible intrusions through firewall traffic analysis based on the Markov chain state transition graph. The research results show that our methods can clearly distinguish malicious traffic from anomaly traffic.