An Advanced Filter-based Supervised Threat Detection Framework on Large Databases

Authors

  • Lakshmi Prasanna Byrapuneni Department of Computer Science and Engineering, Koneru Lakshmaiah Education Foundation, India
  • Maligireddy SaidiReddy Department of Computer Science and Engineering, Koneru Lakshmaiah Education Foundation, India
Volume: 14 | Issue: 4 | Pages: 15681-15685 | August 2024 | https://doi.org/10.48084/etasr.7779

Abstract

Adaptive and robust detection mechanisms are becoming more and more necessary as cyber threats become more complex. This study presents a framework to increase threat detection efficiency and address the complex problems posed by various dynamic cyber threats. This study focuses primarily on investigating a new algorithm for feature classification and selection in predictive modeling applications. Using a sizable real-time threat detection dataset, a hybrid filter-based feature ranking and cluster-based classification approach is proposed. A detailed analysis was carried out to investigate the performance of the proposed algorithm and compare it with various machine-learning models. This study also examines how well the algorithm scales to large-scale datasets and adapts to different data properties. The results highlight the algorithm's potential to enhance the efficiency of predictive modeling by optimizing feature selection procedures and reducing model complexity, thus making a substantial contribution to the field of data-driven decision-making and the wider range of machine-learning applications.

Keywords:

data filtering, outlier detection, cyber-attack detection, multi-class classification

Downloads

Download data is not yet available.

References

"Natural Disasters: A Perfect Storm for Data Breaches | CSA." https://cloudsecurityalliance.org/blog/2023/12/11/natural-disasters-a-perfect-storm-for-data-breaches.

Y. Gao, Y. Liu, Y. Jin, J. Chen, and H. Wu, "A Novel Semi-Supervised Learning Approach for Network Intrusion Detection on Cloud-Based Robotic System," IEEE Access, vol. 6, pp. 50927–50938, 2018.

F. Nabi and X. Zhou, "Enhancing intrusion detection systems through dimensionality reduction: A comparative study of machine learning techniques for cyber security," Cyber Security and Applications, vol. 2, Jan. 2024, Art. no. 100033.

X. Chen, W. Qiu, L. Chen, Y. Ma, and J. Ma, "Fast and practical intrusion detection system based on federated learning for VANET," Computers & Security, vol. 142, Jul. 2024, Art. no. 103881.

S. Kannadhasan and R. Nagarajan, "Intrusion detection in machine learning based E-shaped structure with algorithms, strategies and applications in wireless sensor networks," Heliyon, vol. 10, no. 9, May 2024.

Z. Sun, G. An, Y. Yang, and Y. Liu, "Optimized machine learning enabled intrusion detection 2 system for internet of medical things," Franklin Open, vol. 6, Mar. 2024, Art. no. 100056.

A. Yazdinejad, M. Kazemi, R. M. Parizi, A. Dehghantanha, and H. Karimipour, "An ensemble deep learning model for cyber threat hunting in industrial internet of things," Digital Communications and Networks, vol. 9, no. 1, pp. 101–110, Feb. 2023.

Z. Noor, S. Hina, F. Hayat, and G. A. Shah, "An intelligent context-aware threat detection and response model for smart cyber-physical systems," Internet of Things, vol. 23, Oct. 2023, Art. no. 100843.

K. Aygul, M. Mohammadpourfard, M. Kesici, F. Kucuktezcan, and I. Genc, "Benchmark of machine learning algorithms on transient stability prediction in renewable rich power grids under cyber-attacks," Internet of Things, vol. 25, Apr. 2024, Art. no. 101012.

T. Jiang, G. Shen, C. Guo, Y. Cui, and B. Xie, "BFLS: Blockchain and Federated Learning for sharing threat detection models as Cyber Threat Intelligence," Computer Networks, vol. 224, Apr. 2023, Art. no. 109604.

B. Racherache, P. Shirani, A. Soeanu, and M. Debbabi, "CPID: Insider threat detection using profiling and cyber-persona identification," Computers & Security, vol. 132, Sep. 2023, Art. no. 103350.

T. Chen, H. Zeng, M. Lv, and T. Zhu, "CTIMD: Cyber threat intelligence enhanced malware detection using API call sequences with parameters," Computers & Security, vol. 136, Jan. 2024, Art. no. 103518.

J. Zhang, J. D. Peter, A. Shankar, and W. Viriyasitavat, "Public cloud networks oriented deep neural networks for effective intrusion detection in online music education," Computers and Electrical Engineering, vol. 115, Apr. 2024, Art. no. 109095.

M. Chalé and N. D. Bastian, "Generating realistic cyber data for training and evaluating machine learning classifiers for network intrusion detection systems," Expert Systems with Applications, vol. 207, Nov. 2022, Art. no. 117936.

R. Divya, S. Umamaheswari, and A. A. Stonier, "Machine learning based smart intrusion and fault identification (SIFI) in inverter based cyber-physical microgrids," Expert Systems with Applications, vol. 238, Mar. 2024, Art. no. 122291.

A. Gupta and R. Simon, "Enhancing Security in Cloud Computing With Anomaly Detection Using Random Forest," in 2024 11th International Conference on Reliability, Infocom Technologies and Optimization (Trends and Future Directions) (ICRITO), Mar. 2024, pp. 1–6.

N. Moustafa and J. Slay, "UNSW-NB15: a comprehensive data set for network intrusion detection systems (UNSW-NB15 network data set)," in 2015 Military Communications and Information Systems Conference (MilCIS), Canberra, Australia, Nov. 2015, pp. 1–6.

N. Moustafa and J. Slay, "The evaluation of Network Anomaly Detection Systems: Statistical analysis of the UNSW-NB15 data set and the comparison with the KDD99 data set," Information Security Journal: A Global Perspective, Apr. 2016.

N. Moustafa, J. Slay, and G. Creech, "Novel Geometric Area Analysis Technique for Anomaly Detection Using Trapezoidal Area Estimation on Large-Scale Networks," IEEE Transactions on Big Data, vol. 5, no. 4, pp. 481–494, Sep. 2019.

N. Moustafa, G. Creech, and J. Slay, "Big Data Analytics for Intrusion Detection System: Statistical Decision-Making Using Finite Dirichlet Mixture Models," in Data Analytics and Decision Support for Cybersecurity: Trends, Methodologies and Applications, I. Palomares Carrascosa, H. K. Kalutarage, and Y. Huang, Eds. Cham, Switzerland: Springer International Publishing, 2017, pp. 127–156.

M. Sarhan, S. Layeghy, N. Moustafa, and M. Portmann, "NetFlow Datasets for Machine Learning-Based Network Intrusion Detection Systems," in Big Data Technologies and Applications, 2021, pp. 117–135.

Downloads

How to Cite

[1]
Byrapuneni, L.P. and SaidiReddy, M. 2024. An Advanced Filter-based Supervised Threat Detection Framework on Large Databases. Engineering, Technology & Applied Science Research. 14, 4 (Aug. 2024), 15681–15685. DOI:https://doi.org/10.48084/etasr.7779.

Metrics

Abstract Views: 143
PDF Downloads: 277

Metrics Information