Anomaly-Based Detection of Attack on SSL Protocol using Pyod
Rasmiya Najeem1, Shahnaz K Nassar2, Nima S Nair3
1Rasmiya Najeem*, PG Student, Dept of CS and IT, Amrita School of Arts and Sciences, Kochi, India.
2Shahnaz K Nassar, PG Student, Dept of CS and IT, Amrita School of Arts and Sciences,Kochi, India.
3Nima S Nair, Asst Professor, Dept of CS and IT, Amrita School of Arts and Sciences, Kochi, India.
Manuscript received on March 15, 2020. | Revised Manuscript received on March 27, 2020. | Manuscript published on April 10, 2020. | PP: 1703-1706 | Volume-9 Issue-6, April 2020. | Retrieval Number: F4557049620/2020©BEIESP | DOI: 10.35940/ijitee.F4557.049620
Open Access | Ethics and Policies | Cite | Mendeley
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)
Abstract: At the current era Security and Protection is of vital significance. While there is no system that is immune to attack, a steady and effective system-security-framework is fundamental to ensuring the protection of data. On a fundamental-level, we are living in a more technologically advanced world than we were as of a decade ago. This rise in the broad utilization of technology carried with it and ascent in network attack. Networked PCs have taken over practically all parts of our lives, they store and deal with a ton of data that whenever traded off could bring about critical results. Secure Sockets Layer and Transport Layer Security(SSL/TLS) are presently broadly embraced innovation to give security. SSL/TLS convention is made to give privacy to delicate data trade over the Web. They can be used to secure secrecy and protection however can in like manner be used to shroud vindictive exercises. Regardless, assurance right now in all the information being scrambled independent of whether the information is malignant or not. The SSL-Attackers don’t utilize a particular system for the assault, the attacker may attempt to stick the system by making superfluous-traffic. Using Anomaly-Detection-technique we find the outliers by analyzing the data-captured using Wireshark and identify any possible attack on the network. For detecting outlier in the traffic we have used ABOD technique contained in the PyOD-library, which is an open-source toolbox provided in Python for identification of anomaly on multi-variate information. Anomaly-Based-Detection is a practical and realistic option for identification of attack against security convention.
Keywords: ABOD, Anomaly Detection, Network Traffic Analysis, Outliers, Python, SSL, TLS, Wire-Shark. Abbreviations: SSL, Secure Socket Layer; TLS, Transport Layer Security; SS, System Security; MSK, Master Secret Key;
Scope of the Article: Predictive Analysis