Research Article

Detecting and Analyzing Network Attacks: A Time-Series Analysis Using the Kitsune Dataset

Volume: 5 Number: 1 December 31, 2025
EN

Detecting and Analyzing Network Attacks: A Time-Series Analysis Using the Kitsune Dataset

Abstract

Network security is a critical concern in today’s digital world, requiring efficient methods for the automatic detection and analysis of cyber attacks. This study uses the Kitsune Network Attack Dataset to explore network traffic behavior for IoT devices under various attack scenarios, including ARP MitM, SYN DoS, and Mirai Botnet. Utilizing Python-based data analysis tools, we preprocess and analyze millions of network packets to uncover patterns indicative of malicious activities. The study employs packet-level time-series analysis to visualize traffic patterns and detect anomalies specific to each attack type. Key findings include high packet volumes in attacks such as SSDP Flood and Mirai Botnet, with the Mirai Botnet attack involving multiple IP addresses and lasting over 2 hours. Notable attack-specific behaviors include high traffic on port -1 and targeted traffic on specific ports like 53195. The SYN DoS and Mirai Botnet attacks are characterized by their prolonged durations, suggesting significant disruption. Overall, the study highlights distinctive attack patterns and underscores the importance of understanding these characteristics to enhance detection and response mechanisms.

Keywords

References

  1. Mohammadiounotikandi A., and Babaeitarkami S. (2024). Cybersecurity in the age of AI: protecting our data and privacy in a digital world. Aust. J. Eng. Innov. Technol., 6(4), 86-92. Doi:10.34104/ajeit.024.086092.
  2. Bharati, R. K. (2024). Cyber Threats and the Erosion of Privacy: Examining the Delicate Equilibrium. Preprints 2024, 2024071577. Doi:10.20944/preprints202407.1577.v1
  3. Balisane, H., Egho-Promise, E., Lyada, E., Aina, F., Sangodoyin, A., & Kure, H. (2024). The Effectiveness of a Comprehensive threat Mitigation Framework in NETWORKING: A Multi-Layered Approach to Cyber Security. International Research Journal of Computer Science, 11(06), 529-538., Doi: 10.26562/irjcs.2024.v1106.03.
  4. Balisane, H., Egho-Promise, E. I., Lyada, E., & Aina, F. (2024). Towards Improved Threat Mitigation In Digital Environments: A Comprehensive Framework For Cybersecurity Enhancement. International Journal Of Research-Granthaalayah, 12(5). Doi: 10.29121/granthaalayah.v12.i5.2024.5655.
  5. Sendjaja, T., Irwandi, E. P., Suryani, Y., & Fatmawati, E. (2024). Cybersecurity In The Digital Age: Developing Robust Strategies To Protect Against Evolving Global Digital Threats And Cyber Attacks. International Journal of Science and Society (IJSOC), 6(1), 1008-1019. Doi: 10.54783/ijsoc.v6i1.1098.
  6. Aswathy, M. C., Rajkumar, T.(2024). Real Time Anomaly Detection in Network Traffic: A Comparative Analysis of Machine Learning Algorithms, International Research Journal on Advanced Engineering Hub (IRJAEH), 2(07), 1968-1977. Doi: 10.47392/irjaeh.2024.0269
  7. Hassan, S. E. H., & Duong-Trung, N. (2024). Machine Learning in Cybersecurity: Advanced Detection and Classification Techniques for Network Traffic Environments. EAI Endorsed Transactions on Industrial Networks and Intelligent Systems, 11(3), 1-22. Doi:10.4108/eetinis.v11i3.5237.
  8. Khan, A., Fouda, M. M., Do, D. T., Almaleh, A., & Rahman, A. U. (2023). Short-term traffic prediction using deep learning long short-term memory: Taxonomy, applications, challenges, and future trends. IEEE Access, 11, 94371-94391. Doi:10.1109/ACCESS.2023.3309601.

Details

Primary Language

English

Subjects

System and Network Security , Data Security and Protection

Journal Section

Research Article

Early Pub Date

June 6, 2025

Publication Date

December 31, 2025

Submission Date

October 7, 2024

Acceptance Date

November 2, 2024

Published in Issue

Year 2025 Volume: 5 Number: 1

APA
Abu Khalil, D., & Abuzir, Y. (2025). Detecting and Analyzing Network Attacks: A Time-Series Analysis Using the Kitsune Dataset. Journal of Emerging Computer Technologies, 5(1), 9-23. https://doi.org/10.57020/ject.1563146

Cited By

Journal of Emerging Computer Technologies
is indexed and abstracted by
Harvard Hollis, Scilit, ROAD, Google Scholar, OpenAIRE

Publisher
Izmir Academy Association

88x31.png