Detecting and Analyzing Network Attacks: A Time-Series Analysis Using the Kitsune Dataset DOI Creative Commons

Dima Abu Khalil,

Yousef Abuzir

Journal of Emerging Computer Technologies, Journal Year: 2024, Volume and Issue: 5(1), P. 9 - 23

Published: Nov. 2, 2024

Network security is a critical concern in today’s digital world, requiring efficient methods for the automatic detection and analysis of cyber attacks. This study uses Kitsune Attack Dataset to explore network traffic behavior IoT devices under various attack scenarios, including ARP MitM, SYN DoS, Mirai Botnet. Utilizing Python-based data tools, we preprocess analyze millions packets uncover patterns indicative malicious activities. The employs packet-level time-series visualize detect anomalies specific each type. Key findings include high packet volumes attacks such as SSDP Flood Botnet, with Botnet involving multiple IP addresses lasting over 2 hours. Notable attack-specific behaviors on port -1 targeted ports like 53195. DoS are characterized by their prolonged durations, suggesting significant disruption. Overall, highlights distinctive underscores importance understanding these characteristics enhance response mechanisms.

Language: Английский

A systematic review of criteria influencing the integration of BIM and Immersive Technology in building projects DOI Creative Commons

Bao Pham Van,

Peter S. P. Wong, Behzad Abbasnejad

et al.

Journal of Information Technology in Construction, Journal Year: 2025, Volume and Issue: 30, P. 243 - 297

Published: March 7, 2025

Integrating Building Information Modeling (BIM) and Immersive Technologies (ImT) provides several benefits, such as the inclusion of clients in design process, thereby improving construction management practices. BIM's propensity for digital data management, coupled with ImT's enhanced communication coordination capabilities, addresses inherent issues like fragmentation collaboration challenges projects. While prior studies have primarily examined BIM ImT individually, limited research has explored synergistic integration these two technologies potential benefits they can offer when combined context architecture, engineering, (AEC) industry. This paper reviews strategies prospects integrating existing literature, aiming to identify categorize key socio-technical criteria that support successful ImT. A Systematic Literature Review (SLR) was accordingly employed, following PRISMA guidelines, analyzing 56 academic journals from Scopus ASCE Library databases on building projects 2013 May 2023. The results reveal various attributes integration, including use BIM-related software Autodesk Revit, hardware Oculus Rift HTC Vive, game engines Unity3D, standards FBX, collaborative platforms 360 Trimble Connect. Essential technical were identified aspects: emphasizing system optimization seamless exchange, alongside non-technical focusing user engagement, learning, effective stakeholder collaboration. study also highlights significant gaps, need standardized methodologies, more detailed discussions, user-centric strategies, pinpointing areas further exploration refine practices while providing valuable insights into adoption efficacy transformation AEC sector.

Language: Английский

Citations

0

Detecting and Analyzing Network Attacks: A Time-Series Analysis Using the Kitsune Dataset DOI Creative Commons

Dima Abu Khalil,

Yousef Abuzir

Journal of Emerging Computer Technologies, Journal Year: 2024, Volume and Issue: 5(1), P. 9 - 23

Published: Nov. 2, 2024

Network security is a critical concern in today’s digital world, requiring efficient methods for the automatic detection and analysis of cyber attacks. This study uses Kitsune Attack Dataset to explore network traffic behavior IoT devices under various attack scenarios, including ARP MitM, SYN DoS, Mirai Botnet. Utilizing Python-based data tools, we preprocess analyze millions packets uncover patterns indicative malicious activities. The employs packet-level time-series visualize detect anomalies specific each type. Key findings include high packet volumes attacks such as SSDP Flood Botnet, with Botnet involving multiple IP addresses lasting over 2 hours. Notable attack-specific behaviors on port -1 targeted ports like 53195. DoS are characterized by their prolonged durations, suggesting significant disruption. Overall, highlights distinctive underscores importance understanding these characteristics enhance response mechanisms.

Language: Английский

Citations

0