Detection of Cyber Attacks and Network Attacks Using Machine Learning Algorithms

Rohit Khedkar et al.
{"title":"Detection of Cyber Attacks and Network Attacks Using Machine Learning Algorithms","authors":"Rohit Khedkar et al.","doi":"10.52783/cienceng.v11i1.120","DOIUrl":null,"url":null,"abstract":"Now a days cyber crime growing and has a big effect everywhere globally. ethical hackers are normally involved in identifying flaws and recommending mitigation measures. the cyber safety international, there's a pressing need for the improvement of powerful techniques. Because of the effectiveness of machine learning in cyber security issues, machine learning for cyber security has recently become a hot topic. In cyber security, machine learning approaches have been utilized to handle important concerns such as intrusion detection, malware classification and detection, spam detection, and phishing detection. Although ML cannot fully automate a cyber-security system, it can identify cyber-security threats more efficiently than other software-oriented approaches, relieving security analysts of their burden. As a result, effective adaptive methods, such as machine learning techniques, can yield higher detection rates, lower false alarm rates, and cheaper computing and transmission costs. Our key goal is that the challenge of detecting attacks is fundamentally different from those of these other applications, making it substantially more difficult for the intrusion detection community to apply machine learning effectively. In this study, the CPS is modeled as a network of agents that move in unison with one another, with one agent acting as a leader and commanding the other agents. The proposed strategy in this study is to employ the structure of deep neural networks for the detection phase, which should tell the system of the attack's existence in the early stages of the attack. The use of robust control algorithms in the network to isolate the misbehaving agent in the leader-follower mechanism has been researched. Following the attack detection phase with a deep neural network, the control system uses the reputation algorithm to isolate the misbehaving agent in the presented control method. Experiment results show that deep learning algorithms can detect attacks more effectively than traditional methods, making cyber security simpler, more proactive, and less expensive and more expensive.","PeriodicalId":214525,"journal":{"name":"Proceeding International Conference on Science and Engineering","volume":"21 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2023-02-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Proceeding International Conference on Science and Engineering","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.52783/cienceng.v11i1.120","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

Abstract

Now a days cyber crime growing and has a big effect everywhere globally. ethical hackers are normally involved in identifying flaws and recommending mitigation measures. the cyber safety international, there's a pressing need for the improvement of powerful techniques. Because of the effectiveness of machine learning in cyber security issues, machine learning for cyber security has recently become a hot topic. In cyber security, machine learning approaches have been utilized to handle important concerns such as intrusion detection, malware classification and detection, spam detection, and phishing detection. Although ML cannot fully automate a cyber-security system, it can identify cyber-security threats more efficiently than other software-oriented approaches, relieving security analysts of their burden. As a result, effective adaptive methods, such as machine learning techniques, can yield higher detection rates, lower false alarm rates, and cheaper computing and transmission costs. Our key goal is that the challenge of detecting attacks is fundamentally different from those of these other applications, making it substantially more difficult for the intrusion detection community to apply machine learning effectively. In this study, the CPS is modeled as a network of agents that move in unison with one another, with one agent acting as a leader and commanding the other agents. The proposed strategy in this study is to employ the structure of deep neural networks for the detection phase, which should tell the system of the attack's existence in the early stages of the attack. The use of robust control algorithms in the network to isolate the misbehaving agent in the leader-follower mechanism has been researched. Following the attack detection phase with a deep neural network, the control system uses the reputation algorithm to isolate the misbehaving agent in the presented control method. Experiment results show that deep learning algorithms can detect attacks more effectively than traditional methods, making cyber security simpler, more proactive, and less expensive and more expensive.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
使用机器学习算法检测网络攻击和网络攻击
如今,网络犯罪日益增长,并在全球各地产生了巨大影响。道德黑客通常参与识别漏洞并建议缓解措施。国际上的网络安全,迫切需要改进强大的技术。由于机器学习在网络安全问题上的有效性,机器学习用于网络安全最近成为一个热门话题。在网络安全领域,机器学习方法已被用于处理入侵检测、恶意软件分类和检测、垃圾邮件检测和网络钓鱼检测等重要问题。虽然机器学习不能完全自动化网络安全系统,但它可以比其他面向软件的方法更有效地识别网络安全威胁,减轻安全分析师的负担。因此,有效的自适应方法,如机器学习技术,可以产生更高的检测率,更低的误报率,更便宜的计算和传输成本。我们的主要目标是,检测攻击的挑战与这些其他应用的挑战有着根本的不同,这使得入侵检测社区有效地应用机器学习变得更加困难。在这项研究中,CPS被建模为一个相互一致移动的代理网络,其中一个代理充当领导者并指挥其他代理。本研究提出的策略是在检测阶段采用深度神经网络的结构,该结构应该在攻击的早期阶段告诉系统攻击的存在。研究了在网络中使用鲁棒控制算法来隔离leader-follower机制中行为不端的agent。在深度神经网络攻击检测阶段之后,控制系统使用信誉算法隔离行为不端的智能体。实验结果表明,深度学习算法可以比传统方法更有效地检测攻击,使网络安全更简单,更主动,成本更低,成本更高。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
Impact of Cloud-Based HR Systems on Business Performance Metrics Use of Gesture Recognition for Differently Abled Persons Study on Lead Iodide-Polyvinyl Alcohol Polymer Composites as an X-ray Shielding Material A Novel Heterogenous Dominant Sequence Clustering for Task Scheduling and Optimal Load Balancing Using JSO in Cloud Motivational Theories and Their Relevance in Military Motivation
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1