An Advanced Filter-based Supervised Threat Detection Framework on Large Databases
Received: 9 May 2024 | Revised: 20 May 2024 | Accepted: 29 May 2024 | Online: 20 June 2024
Corresponding author: Maligireddy SaidiReddy
Abstract
Adaptive and robust detection mechanisms are becoming more and more necessary as cyber threats become more complex. This study presents a framework to increase threat detection efficiency and address the complex problems posed by various dynamic cyber threats. This study focuses primarily on investigating a new algorithm for feature classification and selection in predictive modeling applications. Using a sizable real-time threat detection dataset, a hybrid filter-based feature ranking and cluster-based classification approach is proposed. A detailed analysis was carried out to investigate the performance of the proposed algorithm and compare it with various machine-learning models. This study also examines how well the algorithm scales to large-scale datasets and adapts to different data properties. The results highlight the algorithm's potential to enhance the efficiency of predictive modeling by optimizing feature selection procedures and reducing model complexity, thus making a substantial contribution to the field of data-driven decision-making and the wider range of machine-learning applications.
Keywords:
data filtering, outlier detection, cyber-attack detection, multi-class classificationDownloads
References
"Natural Disasters: A Perfect Storm for Data Breaches | CSA." https://cloudsecurityalliance.org/blog/2023/12/11/natural-disasters-a-perfect-storm-for-data-breaches.
Y. Gao, Y. Liu, Y. Jin, J. Chen, and H. Wu, "A Novel Semi-Supervised Learning Approach for Network Intrusion Detection on Cloud-Based Robotic System," IEEE Access, vol. 6, pp. 50927–50938, 2018.
F. Nabi and X. Zhou, "Enhancing intrusion detection systems through dimensionality reduction: A comparative study of machine learning techniques for cyber security," Cyber Security and Applications, vol. 2, Jan. 2024, Art. no. 100033.
X. Chen, W. Qiu, L. Chen, Y. Ma, and J. Ma, "Fast and practical intrusion detection system based on federated learning for VANET," Computers & Security, vol. 142, Jul. 2024, Art. no. 103881.
S. Kannadhasan and R. Nagarajan, "Intrusion detection in machine learning based E-shaped structure with algorithms, strategies and applications in wireless sensor networks," Heliyon, vol. 10, no. 9, May 2024.
Z. Sun, G. An, Y. Yang, and Y. Liu, "Optimized machine learning enabled intrusion detection 2 system for internet of medical things," Franklin Open, vol. 6, Mar. 2024, Art. no. 100056.
A. Yazdinejad, M. Kazemi, R. M. Parizi, A. Dehghantanha, and H. Karimipour, "An ensemble deep learning model for cyber threat hunting in industrial internet of things," Digital Communications and Networks, vol. 9, no. 1, pp. 101–110, Feb. 2023.
Z. Noor, S. Hina, F. Hayat, and G. A. Shah, "An intelligent context-aware threat detection and response model for smart cyber-physical systems," Internet of Things, vol. 23, Oct. 2023, Art. no. 100843.
K. Aygul, M. Mohammadpourfard, M. Kesici, F. Kucuktezcan, and I. Genc, "Benchmark of machine learning algorithms on transient stability prediction in renewable rich power grids under cyber-attacks," Internet of Things, vol. 25, Apr. 2024, Art. no. 101012.
T. Jiang, G. Shen, C. Guo, Y. Cui, and B. Xie, "BFLS: Blockchain and Federated Learning for sharing threat detection models as Cyber Threat Intelligence," Computer Networks, vol. 224, Apr. 2023, Art. no. 109604.
B. Racherache, P. Shirani, A. Soeanu, and M. Debbabi, "CPID: Insider threat detection using profiling and cyber-persona identification," Computers & Security, vol. 132, Sep. 2023, Art. no. 103350.
T. Chen, H. Zeng, M. Lv, and T. Zhu, "CTIMD: Cyber threat intelligence enhanced malware detection using API call sequences with parameters," Computers & Security, vol. 136, Jan. 2024, Art. no. 103518.
J. Zhang, J. D. Peter, A. Shankar, and W. Viriyasitavat, "Public cloud networks oriented deep neural networks for effective intrusion detection in online music education," Computers and Electrical Engineering, vol. 115, Apr. 2024, Art. no. 109095.
M. Chalé and N. D. Bastian, "Generating realistic cyber data for training and evaluating machine learning classifiers for network intrusion detection systems," Expert Systems with Applications, vol. 207, Nov. 2022, Art. no. 117936.
R. Divya, S. Umamaheswari, and A. A. Stonier, "Machine learning based smart intrusion and fault identification (SIFI) in inverter based cyber-physical microgrids," Expert Systems with Applications, vol. 238, Mar. 2024, Art. no. 122291.
A. Gupta and R. Simon, "Enhancing Security in Cloud Computing With Anomaly Detection Using Random Forest," in 2024 11th International Conference on Reliability, Infocom Technologies and Optimization (Trends and Future Directions) (ICRITO), Mar. 2024, pp. 1–6.
N. Moustafa and J. Slay, "UNSW-NB15: a comprehensive data set for network intrusion detection systems (UNSW-NB15 network data set)," in 2015 Military Communications and Information Systems Conference (MilCIS), Canberra, Australia, Nov. 2015, pp. 1–6.
N. Moustafa and J. Slay, "The evaluation of Network Anomaly Detection Systems: Statistical analysis of the UNSW-NB15 data set and the comparison with the KDD99 data set," Information Security Journal: A Global Perspective, Apr. 2016.
N. Moustafa, J. Slay, and G. Creech, "Novel Geometric Area Analysis Technique for Anomaly Detection Using Trapezoidal Area Estimation on Large-Scale Networks," IEEE Transactions on Big Data, vol. 5, no. 4, pp. 481–494, Sep. 2019.
N. Moustafa, G. Creech, and J. Slay, "Big Data Analytics for Intrusion Detection System: Statistical Decision-Making Using Finite Dirichlet Mixture Models," in Data Analytics and Decision Support for Cybersecurity: Trends, Methodologies and Applications, I. Palomares Carrascosa, H. K. Kalutarage, and Y. Huang, Eds. Cham, Switzerland: Springer International Publishing, 2017, pp. 127–156.
M. Sarhan, S. Layeghy, N. Moustafa, and M. Portmann, "NetFlow Datasets for Machine Learning-Based Network Intrusion Detection Systems," in Big Data Technologies and Applications, 2021, pp. 117–135.
Downloads
How to Cite
License
Copyright (c) 2024 Lakshmi Prasanna Byrapuneni, Maligireddy SaidiReddy
This work is licensed under a Creative Commons Attribution 4.0 International License.
Authors who publish with this journal agree to the following terms:
- Authors retain the copyright and grant the journal the right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) after its publication in ETASR with an acknowledgement of its initial publication in this journal.