International Journal of

ADVANCED AND APPLIED SCIENCES

EISSN: 2313-3724, Print ISSN: 2313-626X

Frequency: 12

line decor
  
line decor

 Volume 9, Issue 5 (May 2022), Pages: 60-68

----------------------------------------------

 Original Research Paper

 Title: Detecting block ciphers generic attacks: An instance-based machine learning method

 Author(s): Yazan Ahmad Alsariera *

 Affiliation(s):

 Department of Computer Science, College of Science, Northern Border University, Arar, Saudi Arabia

  Full Text - PDF          XML

 * Corresponding Author. 

  Corresponding author's ORCID profile: https://orcid.org/0000-0003-1359-6336

 Digital Object Identifier: 

 https://doi.org/10.21833/ijaas.2022.05.007

 Abstract:

Cryptography facilitates selective communication through encryption of messages and or data. Block-cipher processing is one of the prominent methods for modern cryptographic symmetric encryption schemes. The rise in attacks on block-ciphers led to the development of more difficult encryption schemes. However, attackers decrypt block-ciphers through generic attacks given sufficient time and computing. Recent research had applied machine learning classification algorithms to develop intrusion detection systems to detect multiple types of attacks. These intrusion detection systems are limited by misclassifying generic attacks and suffer reduced effectiveness when evaluated for detecting generic attacks only. Hence, this study introduced and proposed k-nearest neighbors, an instance-based machine learning classification algorithm, for the detection of generic attacks on block-ciphers. The value of k was varied (i.e., 1, 3, 5, 7, and 9) and multiple nearest neighbors classification models were developed and evaluated using two distance functions (i.e., Manhattan and Euclidean) for classifying between generic attacks and normal network packets. All nearest neighbors models using the Manhattan distance function performed better than their Euclidean counterparts. The 1-nearest neighbor (Manhattan distance function) model had the highest overall accuracy of 99.6%, a generic attack detection rate of 99.5% which tallies with the 5, 7, and 9 nearest neighbors models, and a false alarm rate of 0.0003 which is the same for all Manhattan nearest neighbors classification models. These instance-based methods performed better than some existing methods that even implemented an ensemble of deep-learning algorithms. Therefore, an instance-based method is recommended for detecting block-ciphers generic attacks. 

 © 2022 The Authors. Published by IASE.

 This is an open access article under the CC BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/).

 Keywords: Cryptography, Generic attack, Instance-based machine learning, Cybersecurity and intrusion detection

 Article History: Received 15 December 2021, Received in revised form 3 February 2022, Accepted 3 March 2022

 Acknowledgment 

No Acknowledgment.

 Compliance with ethical standards

 Conflict of interest: The author(s) declared no potential conflicts of interest with respect to the research, authorship, and/or publication of this article.

 Citation:

 Alsariera YA (2022). Detecting block ciphers generic attacks: An instance-based machine learning method. International Journal of Advanced and Applied Sciences, 9(5): 60-68

 Permanent Link to this page

 Figures

 Fig. 1 

 Tables

 Table 1 Table 2 Table 3 Table 4 Table 5 Table 6 Table 7 Table 8 Table 9 Table 10 Table 11 Table 12 Table 13 Table 14 Table 15 Table 16 

----------------------------------------------    

 References (41)

  1. Alsariera YA (2021a). Detecting generic network intrusion attacks using tree-based machine learning methods. International Journal of Advanced Computer Science and Applications, 12(2): 597-603. https://doi.org/10.14569/IJACSA.2021.0120275   [Google Scholar]
  2. Alsariera YA (2021b). Hybridized decision tree methods for detecting generic attack on cipher text. International Journal of Computer Science and Network Security, 21(7): 56-62.   [Google Scholar]
  3. Alsariera YA, Adeyemo VE, Balogun AO, and Alazzawi AK (2020a). AI meta-learners and extra-trees algorithm for the detection of phishing websites. IEEE Access, 8: 142532-142542. https://doi.org/10.1109/ACCESS.2020.3013699   [Google Scholar]
  4. Alsariera YA, Elijah AV, and Balogun AO (2020b). Phishing website detection: Forest by penalizing attributes algorithm and its enhanced variations. Arabian Journal for Science and Engineering, 45(12): 10459-10470. https://doi.org/10.1007/s13369-020-04802-1   [Google Scholar]
  5. Aswath S, Valarmathi RS, Mohan Sai Kumar CH, and Pandiyarajan M (2022). Highly secured steganography method for image communication using random byte hiding and confused and diffused encryption. In: Smys S, Bestak R, Palanisamy R, and Kotuliak I (Eds.), Computer networks and inventive communication technologies: 867-884. Springer, Singapore, Singapore. https://doi.org/10.1007/978-981-16-3728-5_65   [Google Scholar]
  6. Awan IA, Shiraz M, Hashmi MU, Shaheen Q, Akhtar R, and Ditta A (2020). Secure framework enhancing AES algorithm in cloud computing. Security and Communication Networks, 2020: 8863345. https://doi.org/10.1155/2020/8863345   [Google Scholar]
  7. Bahadori M, Järvinen K, and Niemi V (2021). FPGA implementations of 256-Bit SNOW stream ciphers for postquantum mobile security. IEEE Transactions on Very Large Scale Integration (VLSI) Systems, 29(11): 1943-1954. https://doi.org/10.1109/TVLSI.2021.3108430   [Google Scholar]
  8. Bhattacharyya S and Chakrabarti A (2022). Post-quantum cryptography. In: Sharma N, Chakrabarti A, Balas VE, Bruckstein AM (Eds.), Data management, analytics and innovation: 375-405. Springer, Singapore, Singapore. https://doi.org/10.1007/978-981-16-2937-2_24   [Google Scholar]
  9. Dutta V, Choraś M, Kozik R, and Pawlicki M (2019). Hybrid model for improving the classification effectiveness of network intrusion detection. In the Computational Intelligence in Security for Information Systems Conference, Springer, Seville, Spain: 405-414. https://doi.org/10.1007/978-3-030-57805-3_38   [Google Scholar]
  10. Easttom W (2021). Basic information theory. In: Easttom W (Ed.), Modern cryptography: 51-72. Springer, Cham, Switzerland. https://doi.org/10.1007/978-3-030-63115-4_3   [Google Scholar]
  11. Elijah AV, Abdullah A, Jhanjhi N, Supramaniam M, and Abdullateef B (2019). Ensemble and deep-learning methods for two-class and multi-attack anomaly intrusion detection: An empirical study. International Journal of Advanced Computer Science and Applications, 10(9): 520-528. https://doi.org/10.14569/IJACSA.2019.0100969   [Google Scholar]
  12. Faker O and Dogdu E (2019). Intrusion detection using big data and deep learning techniques. In the 2019 ACM Southeast Conference, Association for Computing Machinery, Kennesaw, USA: 86-93. https://doi.org/10.1145/3299815.3314439   [Google Scholar]
  13. Feng F, Liu X, Yong B, Zhou R, and Zhou Q (2019). Anomaly detection in ad-hoc networks based on deep learning model: A plug and play device. Ad Hoc Networks, 84: 82-89. https://doi.org/10.1016/j.adhoc.2018.09.014   [Google Scholar]
  14. Gauthama Raman MR, Somu N, Jagarapu S, Manghnani T, Selvam T, Krithivasan K, and Shankar Sriram VS (2020). An efficient intrusion detection technique based on support vector machine and improved binary gravitational search algorithm. Artificial Intelligence Review, 53(5): 3255-3286. https://doi.org/10.1007/s10462-019-09762-z   [Google Scholar]
  15. Gharaee H and Hosseinvand H (2016). A new feature selection IDS based on genetic algorithm and SVM. In the 8th International Symposium on Telecommunications (IST), IEEE, Tehran, Iran: 139-144. https://doi.org/10.1109/ISTEL.2016.7881798   [Google Scholar]
  16. Idhammad M, Afdel K, and Belouch M (2018). Semi-supervised machine learning approach for DDoS detection. Applied Intelligence, 48(10): 3193-3208. https://doi.org/10.1007/s10489-018-1141-2   [Google Scholar]
  17. Kasongo SM and Sun Y (2020). Performance analysis of intrusion detection systems using a feature selection method on the UNSW-NB15 dataset. Journal of Big Data, 7: 105. https://doi.org/10.1186/s40537-020-00379-6   [Google Scholar]
  18. Kshirsagar A and Shah M (2021). Anatomized study of security solutions for multimedia: Deep learning-enabled authentication, cryptography and information hiding. Advanced security solutions for multimedia. In: Ansari IA and Bajaj V (Eds.), Advanced security solutions for multimedia: (7-1)-(7-26). IOP Publishing Ltd., Bristol, UK. https://doi.org/10.1088/978-0-7503-3735-9ch7   [Google Scholar]
  19. Kumar V, Sinha D, Das AK, Pandey SC, and Goswami RT (2020). An integrated rule based intrusion detection system: Analysis on UNSW-NB15 data set and the real time online dataset. Cluster Computing, 23(2): 1397-1418. https://doi.org/10.1007/s10586-019-03008-x   [Google Scholar]
  20. Li G, Yan Z, Fu Y, and Chen H (2018). Data fusion for network intrusion detection: A review. Security and Communication Networks, 2018: 8210614. https://doi.org/10.1155/2018/8210614   [Google Scholar]
  21. Li N, Shepperd M, and Guo Y (2020). A systematic review of unsupervised learning techniques for software defect prediction. Information and Software Technology, 122: 106287. https://doi.org/10.1016/j.infsof.2020.106287   [Google Scholar]
  22. Mabayoje MA, Balogun AO, Ameen AO, and Adeyemo VE (2016). Influence of feature selection on multi-layer perceptron classifier for intrusion detection system. Computing, Information Systems, Development Informatics and Allied Research Journal, 7: 87-94.   [Google Scholar]
  23. Mabayoje MA, Balogun AO, Jibril HA, Atoyebi JO, Mojeed HA, and Adeyemo VE (2019). Parameter tuning in KNN for software defect prediction: An empirical analysis. Jurnal Teknologi dan Sistem Komputer, 7(4): 121-126. https://doi.org/10.14710/jtsiskom.7.4.2019.121-126   [Google Scholar]
  24. Mebawondu JO, Alowolodu OD, Mebawondu JO, and Adetunmbi AO (2020). Network intrusion detection system using supervised learning paradigm. Scientific African, 9: e00497. https://doi.org/10.1016/j.sciaf.2020.e00497   [Google Scholar]
  25. Moustafa N and Slay J (2015). UNSW-NB15: A comprehensive data set for network intrusion detection systems (UNSW-NB15 network data set). In the Military Communications and Information Systems Conference (MilCIS), IEEE, Canberra, Australia: 1-6. https://doi.org/10.1109/MilCIS.2015.7348942   [Google Scholar] PMCid:PMC4676426
  26. Nahar K and Chakraborty P (2020). A modified version of vigenere cipher using 95×95 table. International Journal of Engineering and Advanced Technology (IJEAT), 9(5): 1144-1148. https://doi.org/10.35940/ijeat.E9941.069520   [Google Scholar]
  27. Nawir M, Amir A, Lynn OB, Yaakob N, and Ahmad RB (2018). Performances of machine learning algorithms for binary classification of network anomaly detection system. Journal of Physics: Conference Series: 1st International Conference on Big Data and Cloud Computing, Kuching, Malaysia, 1018: 012015. https://doi.org/10.1088/1742-6596/1018/1/012015   [Google Scholar]
  28. Olasehinde OO (2020). A stacked ensemble intrusion detection approach for the protection of information system. International Journal for Information Security Research, 10: 910-923. https://doi.org/10.20533/ijisr.2042.4639.2020.0105   [Google Scholar]
  29. Saleh AI, Talaat FM, and Labib LM (2019). A hybrid intrusion detection system (HIDS) based on prioritized k-nearest neighbors and optimized SVM classifiers. Artificial Intelligence Review, 51(3): 403-443. https://doi.org/10.1007/s10462-017-9567-1   [Google Scholar]
  30. Salman T, Bhamare D, Erbad A, Jain R, and Samaka M (2017). Machine learning for anomaly detection and categorization in multi-cloud environments. In the IEEE 4th International Conference on Cyber Security and Cloud Computing, IEEE, New York, USA: 97-103. https://doi.org/10.1109/CSCloud.2017.15   [Google Scholar] PMid:28017257
  31. Samoriski JH (2020). Encryption and hacking: Cyphers, hacks and attacks on the digital frontier. In: Filimowicz M and Tzankova V (Eds.), Reimagining communication: Action: 89-106. Routledge, Milton Park, UK. https://doi.org/10.4324/9781351015233-5   [Google Scholar]
  32. Saračević MH, Adamović SZ, Miškovic VA, Elhoseny M, Maček ND, Selim MM, and Shankar K (2020). Data encryption for Internet of Things applications based on Catalan objects and two combinatorial structures. IEEE Transactions on Reliability, 70(2): 819-830. https://doi.org/10.1109/TR.2020.3010973   [Google Scholar]
  33. Sarumi OA, Adetunmbi AO, and Adetoye FA (2020). Discovering computer networks intrusion using data analytics and machine intelligence. Scientific African, 9: e00500. https://doi.org/10.1016/j.sciaf.2020.e00500   [Google Scholar]
  34. Sevin A and Mohammed AAO (2021). A survey on software implementation of lightweight block ciphers for IoT devices. Journal of Ambient Intelligence and Humanized Computing: 1-15. https://doi.org/10.1007/s12652-021-03395-3   [Google Scholar]
  35. Sharma J, Giri C, Granmo OC, and Goodwin M (2019). Multi-layer intrusion detection system with ExtraTrees feature selection, extreme learning machine ensemble, and softmax aggregation. EURASIP Journal on Information Security, 2019(1): 1-16. https://doi.org/10.1186/s13635-019-0098-y   [Google Scholar]
  36. Shetty VS, Anusha R, MJ DK, and Hegde P (2020). A survey on performance analysis of block cipher algorithms. In the International Conference on Inventive Computation Technologies, IEEE, Coimbatore, India: 167-174. https://doi.org/10.1109/ICICT48043.2020.9112491   [Google Scholar]
  37. Thaseen IS, Chitturi AK, Al‐Turjman F, Shankar A, Ghalib MR, and Abhishek K (2020a). An intelligent ensemble of long‐short‐term memory with genetic algorithm for network anomaly identification. Transactions on Emerging Telecommunications Technologies, 2020: e4149. https://doi.org/10.1002/ett.4149   [Google Scholar]
  38. Thaseen IS, Poorva B, and Ushasree PS (2020b). Network intrusion detection using machine learning techniques. In the International Conference on Emerging Trends in Information Technology and Engineering, IEEE, Vellore, India: 1-7. https://doi.org/10.1109/ic-ETITE47903.2020.148   [Google Scholar]
  39. Verma P and Shakya M (2021). Machine learning model for predicting major depressive disorder using RNA-Seq data: Optimization of classification approach. Cognitive Neurodynamics: 1-11. https://doi.org/10.1007/s11571-021-09724-8   [Google Scholar] PMid:35401859
  40. Wei W, Chen S, Lin Q, Ji J, and Chen J (2020). A multi-objective immune algorithm for intrusion feature selection. Applied Soft Computing, 95: 106522. https://doi.org/10.1016/j.asoc.2020.106522   [Google Scholar]
  41. Xin Y, Kong L, Liu Z, Chen Y, Li Y, and Zhu HGM (2018). Machine learning and deep learning methods for cybersecurity. IEEE Access, 6: 35365-35381. https://doi.org/10.1109/ACCESS.2018.2836950   [Google Scholar]