Cyber Threat Attack Level Detection Using Machine Learning

This study focuses on creating a machine learning-based system for identifying cyber-attacks in real time using network data, system logs, and attack history. The work presents a thorough methodology that includes data collection, preprocessing, feature selection, model training, and real-time monit...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:2025 3rd International Conference on Intelligent Data Communication Technologies and Internet of Things (IDCIoT) S. 442 - 449
Hauptverfasser: R, Rahul, Mythili, S.
Format: Tagungsbericht
Sprache:Englisch
Veröffentlicht: IEEE 05.02.2025
Schlagworte:
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
Abstract This study focuses on creating a machine learning-based system for identifying cyber-attacks in real time using network data, system logs, and attack history. The work presents a thorough methodology that includes data collection, preprocessing, feature selection, model training, and real-time monitoring. The system uses a variety of machine learning techniques to classify attack types, including supervised learning methods such as Random Forest, Support Vector Machines (SVM), and Neural Networks, as well as unsupervised learning methods such as clustering to detect anomalies that indicate potential threats. The model was trained and evaluated on a dataset of 477 items, reaching an accuracy of 83.33%, with 470 entries identified as carrying threats. The study effectively proved the ability to detect numerous attack types, such as SQL injection, cross-site scripting (XSS), and DDoS attacks, as well as accurately classify and prioritize threat levels. Furthermore, the system was successfully deployed in a live environment, providing real-time threat detection, automatic response capabilities, and detailed alerts to security personnel. This research resulted in the creation of an efficient and scalable cyber threat detection framework capable of both detecting existing attacks and discovering novel, previously unknown threats.
AbstractList This study focuses on creating a machine learning-based system for identifying cyber-attacks in real time using network data, system logs, and attack history. The work presents a thorough methodology that includes data collection, preprocessing, feature selection, model training, and real-time monitoring. The system uses a variety of machine learning techniques to classify attack types, including supervised learning methods such as Random Forest, Support Vector Machines (SVM), and Neural Networks, as well as unsupervised learning methods such as clustering to detect anomalies that indicate potential threats. The model was trained and evaluated on a dataset of 477 items, reaching an accuracy of 83.33%, with 470 entries identified as carrying threats. The study effectively proved the ability to detect numerous attack types, such as SQL injection, cross-site scripting (XSS), and DDoS attacks, as well as accurately classify and prioritize threat levels. Furthermore, the system was successfully deployed in a live environment, providing real-time threat detection, automatic response capabilities, and detailed alerts to security personnel. This research resulted in the creation of an efficient and scalable cyber threat detection framework capable of both detecting existing attacks and discovering novel, previously unknown threats.
Author R, Rahul
Mythili, S.
Author_xml – sequence: 1
  givenname: Rahul
  surname: R
  fullname: R, Rahul
  email: rrock8341@gmail.com
  organization: Karpagam Academy of Higher Education,Department of Computer Science,Coimbatore,India
– sequence: 2
  givenname: S.
  surname: Mythili
  fullname: Mythili, S.
  email: Smythili78@gmail.com
  organization: Karpagam Academy of Higher Education,Department of Computer Science,Coimbatore,India
BookMark eNo1j81OwzAQhI0EByh9Aw7mARLs3Wxsc6tSfiIF9UA4V266oRbFRa6F1LcnEnAa6RvpG82VOI-HyELcalVqrdxdu2zaVV9XgFSCAionqEkRnYm5M84iagJDlbsU981pw0n2u8Q-y0XOfviQHX_zXi4585DDIcq3Y4jv8sUPuxB5an2KE7gWF6PfH3n-lzPx-vjQN89Ft3pqm0VXBIe5sDQCG3SmRlsbi2ysr3Aa14COneERRqorBPAwwGDYeNgCsfK0sbjFmbj5tQZmXn-l8OnTaf1_CH8AuMhEOg
ContentType Conference Proceeding
DBID 6IE
6IL
CBEJK
RIE
RIL
DOI 10.1109/IDCIOT64235.2025.10915055
DatabaseName IEEE Electronic Library (IEL) Conference Proceedings
IEEE Xplore POP ALL
IEEE Xplore All Conference Proceedings
IEEE Electronic Library (IEL)
IEEE Proceedings Order Plans (POP All) 1998-Present
DatabaseTitleList
Database_xml – sequence: 1
  dbid: RIE
  name: IEEE Electronic Library (IEL)
  url: https://ieeexplore.ieee.org/
  sourceTypes: Publisher
DeliveryMethod fulltext_linktorsrc
EISBN 9798331527549
EndPage 449
ExternalDocumentID 10915055
Genre orig-research
GroupedDBID 6IE
6IL
CBEJK
RIE
RIL
ID FETCH-LOGICAL-i93t-85f2e73976386783e78a437541239e97ef2f564322a2c2c7e7a2d25e0a5b83d3
IEDL.DBID RIE
IngestDate Wed Mar 19 05:40:49 EDT 2025
IsPeerReviewed false
IsScholarly false
Language English
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-i93t-85f2e73976386783e78a437541239e97ef2f564322a2c2c7e7a2d25e0a5b83d3
PageCount 8
ParticipantIDs ieee_primary_10915055
PublicationCentury 2000
PublicationDate 2025-Feb.-5
PublicationDateYYYYMMDD 2025-02-05
PublicationDate_xml – month: 02
  year: 2025
  text: 2025-Feb.-5
  day: 05
PublicationDecade 2020
PublicationTitle 2025 3rd International Conference on Intelligent Data Communication Technologies and Internet of Things (IDCIoT)
PublicationTitleAbbrev IDCIOT
PublicationYear 2025
Publisher IEEE
Publisher_xml – name: IEEE
Score 1.8977839
Snippet This study focuses on creating a machine learning-based system for identifying cyber-attacks in real time using network data, system logs, and attack history....
SourceID ieee
SourceType Publisher
StartPage 442
SubjectTerms Accuracy
Alert System
Anomaly Detection
Automated Threat Mitigation
Cyber Threat Detection
Data models
Django Framework
Feature extraction
Incident Response
Network Traffic Analysis
Optimization
Prevention and mitigation
Real-time Monitoring
Real-time systems
Security Logs
SQL injection
Support vector machines
Telecommunication traffic
Threat assessment
Threat Management
Title Cyber Threat Attack Level Detection Using Machine Learning
URI https://ieeexplore.ieee.org/document/10915055
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV1NSwMxEB1sEfGk4orfRPC6bXeyabLepLVY0FpwD72V7O5Ei7AtdSv4703SreLBg7cQBsIkkDeTvHkDcO1yBKElhnFXmzBWcRTqBAsnr606SkdSC-ObTcjRSE0mybguVve1METkyWfUckP_l1_M85V7Kms7EUuL2KIBDSm762KtHbiqdTPbw35v-JTagJoLm_ihaG3sf3VO8cAx2PvnkvsQ_JTgsfE3uBzAFpWHcNP7zGjJ0lcX6bHbqtL5G3twtB_Wp8qTqkrmSQDs0ZMkidX6qS8BPA_u0t59WDc_CGcJr0IlDJJ0wQJXFk84SaVj167WIk1CiSSDRthoAlFjjrkkqbFAQR0tMsULfgTNcl7SMTCOKuNoVB4V1r5rMknEKcqEvdlUkdAJBM7t6WKtbjHdeHz6x_wZ7LrN9cxlcQ7NarmiC9jOP6rZ-_LSn8kXwqiMhw
linkProvider IEEE
linkToHtml http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV1NSwMxEB20inpSseK3Ebxu251smqw3aS0ttrXgHnor2d3ZWoSt1K3gvzdJt4oHD95CSAiTQN5M8uYNwK2NEYSW6AVNnXmBCnxPh5haeW3VUNqXWmSu2IQcDtV4HI7KZHWXC0NEjnxGNdt0f_npPFnap7K6FbE0iC02YUsEATZW6Vo7cFMqZ9Z77VbvKTIuNRcm9ENRW8_4VTvFQUdn_5-LHkD1JwmPjb7h5RA2KD-Cu9ZnTAsWvVhfj90XhU5eWd8Sf1ibCkerypmjAbCBo0kSKxVUp1V47jxEra5Xlj_wZiEvPCUyJGndBa4MonCSSge2YK3BmpBCSRlmwvgTiBoTTCRJjSkKamgRK57yY6jk85xOgHFUMcdMJX5qxjezWBJx8mNh7jaVhnQKVWv25G2lbzFZW3z2R_817HajQX_S7w0fz2HPbrTjMYsLqBSLJV3CdvJRzN4XV-58vgBFJo_O
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=proceeding&rft.title=2025+3rd+International+Conference+on+Intelligent+Data+Communication+Technologies+and+Internet+of+Things+%28IDCIoT%29&rft.atitle=Cyber+Threat+Attack+Level+Detection+Using+Machine+Learning&rft.au=R%2C+Rahul&rft.au=Mythili%2C+S.&rft.date=2025-02-05&rft.pub=IEEE&rft.spage=442&rft.epage=449&rft_id=info:doi/10.1109%2FIDCIOT64235.2025.10915055&rft.externalDocID=10915055