Cyber Threat Attack Level Detection Using Machine Learning
This study focuses on creating a machine learning-based system for identifying cyber-attacks in real time using network data, system logs, and attack history. The work presents a thorough methodology that includes data collection, preprocessing, feature selection, model training, and real-time monit...
Gespeichert in:
| Veröffentlicht in: | 2025 3rd International Conference on Intelligent Data Communication Technologies and Internet of Things (IDCIoT) S. 442 - 449 |
|---|---|
| Hauptverfasser: | , |
| Format: | Tagungsbericht |
| Sprache: | Englisch |
| Veröffentlicht: |
IEEE
05.02.2025
|
| Schlagworte: | |
| Online-Zugang: | Volltext |
| Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
| Abstract | This study focuses on creating a machine learning-based system for identifying cyber-attacks in real time using network data, system logs, and attack history. The work presents a thorough methodology that includes data collection, preprocessing, feature selection, model training, and real-time monitoring. The system uses a variety of machine learning techniques to classify attack types, including supervised learning methods such as Random Forest, Support Vector Machines (SVM), and Neural Networks, as well as unsupervised learning methods such as clustering to detect anomalies that indicate potential threats. The model was trained and evaluated on a dataset of 477 items, reaching an accuracy of 83.33%, with 470 entries identified as carrying threats. The study effectively proved the ability to detect numerous attack types, such as SQL injection, cross-site scripting (XSS), and DDoS attacks, as well as accurately classify and prioritize threat levels. Furthermore, the system was successfully deployed in a live environment, providing real-time threat detection, automatic response capabilities, and detailed alerts to security personnel. This research resulted in the creation of an efficient and scalable cyber threat detection framework capable of both detecting existing attacks and discovering novel, previously unknown threats. |
|---|---|
| AbstractList | This study focuses on creating a machine learning-based system for identifying cyber-attacks in real time using network data, system logs, and attack history. The work presents a thorough methodology that includes data collection, preprocessing, feature selection, model training, and real-time monitoring. The system uses a variety of machine learning techniques to classify attack types, including supervised learning methods such as Random Forest, Support Vector Machines (SVM), and Neural Networks, as well as unsupervised learning methods such as clustering to detect anomalies that indicate potential threats. The model was trained and evaluated on a dataset of 477 items, reaching an accuracy of 83.33%, with 470 entries identified as carrying threats. The study effectively proved the ability to detect numerous attack types, such as SQL injection, cross-site scripting (XSS), and DDoS attacks, as well as accurately classify and prioritize threat levels. Furthermore, the system was successfully deployed in a live environment, providing real-time threat detection, automatic response capabilities, and detailed alerts to security personnel. This research resulted in the creation of an efficient and scalable cyber threat detection framework capable of both detecting existing attacks and discovering novel, previously unknown threats. |
| Author | R, Rahul Mythili, S. |
| Author_xml | – sequence: 1 givenname: Rahul surname: R fullname: R, Rahul email: rrock8341@gmail.com organization: Karpagam Academy of Higher Education,Department of Computer Science,Coimbatore,India – sequence: 2 givenname: S. surname: Mythili fullname: Mythili, S. email: Smythili78@gmail.com organization: Karpagam Academy of Higher Education,Department of Computer Science,Coimbatore,India |
| BookMark | eNo1j81OwzAQhI0EByh9Aw7mARLs3Wxsc6tSfiIF9UA4V266oRbFRa6F1LcnEnAa6RvpG82VOI-HyELcalVqrdxdu2zaVV9XgFSCAionqEkRnYm5M84iagJDlbsU981pw0n2u8Q-y0XOfviQHX_zXi4585DDIcq3Y4jv8sUPuxB5an2KE7gWF6PfH3n-lzPx-vjQN89Ft3pqm0VXBIe5sDQCG3SmRlsbi2ysr3Aa14COneERRqorBPAwwGDYeNgCsfK0sbjFmbj5tQZmXn-l8OnTaf1_CH8AuMhEOg |
| ContentType | Conference Proceeding |
| DBID | 6IE 6IL CBEJK RIE RIL |
| DOI | 10.1109/IDCIOT64235.2025.10915055 |
| DatabaseName | IEEE Electronic Library (IEL) Conference Proceedings IEEE Xplore POP ALL IEEE Xplore All Conference Proceedings IEEE Electronic Library (IEL) IEEE Proceedings Order Plans (POP All) 1998-Present |
| DatabaseTitleList | |
| Database_xml | – sequence: 1 dbid: RIE name: IEEE Electronic Library (IEL) url: https://ieeexplore.ieee.org/ sourceTypes: Publisher |
| DeliveryMethod | fulltext_linktorsrc |
| EISBN | 9798331527549 |
| EndPage | 449 |
| ExternalDocumentID | 10915055 |
| Genre | orig-research |
| GroupedDBID | 6IE 6IL CBEJK RIE RIL |
| ID | FETCH-LOGICAL-i93t-85f2e73976386783e78a437541239e97ef2f564322a2c2c7e7a2d25e0a5b83d3 |
| IEDL.DBID | RIE |
| IngestDate | Wed Mar 19 05:40:49 EDT 2025 |
| IsPeerReviewed | false |
| IsScholarly | false |
| Language | English |
| LinkModel | DirectLink |
| MergedId | FETCHMERGED-LOGICAL-i93t-85f2e73976386783e78a437541239e97ef2f564322a2c2c7e7a2d25e0a5b83d3 |
| PageCount | 8 |
| ParticipantIDs | ieee_primary_10915055 |
| PublicationCentury | 2000 |
| PublicationDate | 2025-Feb.-5 |
| PublicationDateYYYYMMDD | 2025-02-05 |
| PublicationDate_xml | – month: 02 year: 2025 text: 2025-Feb.-5 day: 05 |
| PublicationDecade | 2020 |
| PublicationTitle | 2025 3rd International Conference on Intelligent Data Communication Technologies and Internet of Things (IDCIoT) |
| PublicationTitleAbbrev | IDCIOT |
| PublicationYear | 2025 |
| Publisher | IEEE |
| Publisher_xml | – name: IEEE |
| Score | 1.8977839 |
| Snippet | This study focuses on creating a machine learning-based system for identifying cyber-attacks in real time using network data, system logs, and attack history.... |
| SourceID | ieee |
| SourceType | Publisher |
| StartPage | 442 |
| SubjectTerms | Accuracy Alert System Anomaly Detection Automated Threat Mitigation Cyber Threat Detection Data models Django Framework Feature extraction Incident Response Network Traffic Analysis Optimization Prevention and mitigation Real-time Monitoring Real-time systems Security Logs SQL injection Support vector machines Telecommunication traffic Threat assessment Threat Management |
| Title | Cyber Threat Attack Level Detection Using Machine Learning |
| URI | https://ieeexplore.ieee.org/document/10915055 |
| hasFullText | 1 |
| inHoldings | 1 |
| isFullTextHit | |
| isPrint | |
| link | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV1NSwMxEB1sEfGk4orfRPC6bXeyabLepLVY0FpwD72V7O5Ei7AtdSv4703SreLBg7cQBsIkkDeTvHkDcO1yBKElhnFXmzBWcRTqBAsnr606SkdSC-ObTcjRSE0mybguVve1METkyWfUckP_l1_M85V7Kms7EUuL2KIBDSm762KtHbiqdTPbw35v-JTagJoLm_ihaG3sf3VO8cAx2PvnkvsQ_JTgsfE3uBzAFpWHcNP7zGjJ0lcX6bHbqtL5G3twtB_Wp8qTqkrmSQDs0ZMkidX6qS8BPA_u0t59WDc_CGcJr0IlDJJ0wQJXFk84SaVj167WIk1CiSSDRthoAlFjjrkkqbFAQR0tMsULfgTNcl7SMTCOKuNoVB4V1r5rMknEKcqEvdlUkdAJBM7t6WKtbjHdeHz6x_wZ7LrN9cxlcQ7NarmiC9jOP6rZ-_LSn8kXwqiMhw |
| linkProvider | IEEE |
| linkToHtml | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV1NSwMxEB20inpSseK3Ebxu251smqw3aS0ttrXgHnor2d3ZWoSt1K3gvzdJt4oHD95CSAiTQN5M8uYNwK2NEYSW6AVNnXmBCnxPh5haeW3VUNqXWmSu2IQcDtV4HI7KZHWXC0NEjnxGNdt0f_npPFnap7K6FbE0iC02YUsEATZW6Vo7cFMqZ9Z77VbvKTIuNRcm9ENRW8_4VTvFQUdn_5-LHkD1JwmPjb7h5RA2KD-Cu9ZnTAsWvVhfj90XhU5eWd8Sf1ibCkerypmjAbCBo0kSKxVUp1V47jxEra5Xlj_wZiEvPCUyJGndBa4MonCSSge2YK3BmpBCSRlmwvgTiBoTTCRJjSkKamgRK57yY6jk85xOgHFUMcdMJX5qxjezWBJx8mNh7jaVhnQKVWv25G2lbzFZW3z2R_817HajQX_S7w0fz2HPbrTjMYsLqBSLJV3CdvJRzN4XV-58vgBFJo_O |
| openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=proceeding&rft.title=2025+3rd+International+Conference+on+Intelligent+Data+Communication+Technologies+and+Internet+of+Things+%28IDCIoT%29&rft.atitle=Cyber+Threat+Attack+Level+Detection+Using+Machine+Learning&rft.au=R%2C+Rahul&rft.au=Mythili%2C+S.&rft.date=2025-02-05&rft.pub=IEEE&rft.spage=442&rft.epage=449&rft_id=info:doi/10.1109%2FIDCIOT64235.2025.10915055&rft.externalDocID=10915055 |