Anomaly-Based Detection of Attack on SSL Protocol using Pyod

  • et al.
N/ACitations
Citations of this article
2Readers
Mendeley users who have this article in their library.
Get full text

Abstract

At the current era Security and Protection is of vital significance. While there is no system that is immune to attack, a steady and effective system-security-framework is fundamental to ensuring the protection of data. On a fundamental-level, we are living in a more technologically advanced world than we were as of a decade ago. This rise in the broad utilization of technology carried with it and ascent in network attack. Networked PCs have taken over practically all parts of our lives, they store and deal with a ton of data that whenever traded off could bring about critical results. Secure Sockets Layer and Transport Layer Security(SSL/TLS) are presently broadly embraced innovation to give security. SSL/TLS convention is made to give privacy to delicate data trade over the Web. They can be used to secure secrecy and protection however can in like manner be used to shroud vindictive exercises. Regardless, assurance right now in all the information being scrambled independent of whether the information is malignant or not. The SSL-Attackers don’t utilize a particular system for the assault, the attacker may attempt to stick the system by making superfluous-traffic. Using Anomaly-Detection-technique we find the outliers by analyzing the data-captured using Wireshark and identify any possible attack on the network. For detecting outlier in the traffic we have used ABOD technique contained in the PyOD-library, which is an open-source toolbox provided in Python for identification of anomaly on multi-variate information. Anomaly-Based-Detection is a practical and realistic option for identification of attack against security-convention.

Cite

CITATION STYLE

APA

Najeem*, R., Nassar, S. K., & Nair, N. S. (2020). Anomaly-Based Detection of Attack on SSL Protocol using Pyod. International Journal of Innovative Technology and Exploring Engineering, 9(6), 1703–1706. https://doi.org/10.35940/ijitee.f4557.049620

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free