{"title":"基于马尔可夫链的恶意流量分析","authors":"Ryandy Djap, Charles Lim, Kalpin Erlangga Silaen","doi":"10.1145/3557738.3557849","DOIUrl":null,"url":null,"abstract":"A massive increase in cyber attacks during pandemics has made enterprise organizations around the world strive to find new ways to comprehend and detect unknown threats. A firewall has been devised specifically for these tasks, warding off external attacks on the enterprise perimeter network. Our research aims to identify these possible intrusions through firewall traffic analysis based on the Markov chain state transition graph. The research results show that our methods can clearly distinguish malicious traffic from anomaly traffic.","PeriodicalId":178760,"journal":{"name":"Proceedings of the 2022 International Conference on Engineering and Information Technology for Sustainable Industry","volume":"126 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2022-09-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Malicious traffic analysis using Markov chain\",\"authors\":\"Ryandy Djap, Charles Lim, Kalpin Erlangga Silaen\",\"doi\":\"10.1145/3557738.3557849\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"A massive increase in cyber attacks during pandemics has made enterprise organizations around the world strive to find new ways to comprehend and detect unknown threats. A firewall has been devised specifically for these tasks, warding off external attacks on the enterprise perimeter network. Our research aims to identify these possible intrusions through firewall traffic analysis based on the Markov chain state transition graph. The research results show that our methods can clearly distinguish malicious traffic from anomaly traffic.\",\"PeriodicalId\":178760,\"journal\":{\"name\":\"Proceedings of the 2022 International Conference on Engineering and Information Technology for Sustainable Industry\",\"volume\":\"126 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2022-09-21\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Proceedings of the 2022 International Conference on Engineering and Information Technology for Sustainable Industry\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1145/3557738.3557849\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Proceedings of the 2022 International Conference on Engineering and Information Technology for Sustainable Industry","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1145/3557738.3557849","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
A massive increase in cyber attacks during pandemics has made enterprise organizations around the world strive to find new ways to comprehend and detect unknown threats. A firewall has been devised specifically for these tasks, warding off external attacks on the enterprise perimeter network. Our research aims to identify these possible intrusions through firewall traffic analysis based on the Markov chain state transition graph. The research results show that our methods can clearly distinguish malicious traffic from anomaly traffic.