USING THE RANDOM FOREST MACHINE LEARNING ALGORITHM FOR THE ExTRACTION OF COMPLEx COMPUTER INCIDENTS

A. Pavlychev, M. Starodubov, Alexander Galimov
{"title":"USING THE RANDOM FOREST MACHINE LEARNING ALGORITHM FOR THE ExTRACTION OF COMPLEx COMPUTER INCIDENTS","authors":"A. Pavlychev, M. Starodubov, Alexander Galimov","doi":"10.21681/2311-3456-2022-5-74-81","DOIUrl":null,"url":null,"abstract":"The aim of the work is to develop a way to identify complex computer incidents carried out by attackers by exploiting vulnerabilities of information systems. The research method is the analysis of entries in the system logs of the Microsoft Windows operating system using the Random Forest machine learning algorithm. The result obtained: despite the wide variety of different types of malicious software used by attackers in conducting computer attacks, they all leave traces of their functioning to the network infrastructure that has been exposed to unauthorized effects. One of the ways to identify computer incidents is to examine the log files of various information systems, including the system logs of the operating system for the identification of hidden patterns and various anomalies. The functioning of any computer program can be represented as a unique set of records in the system logs of the operating system, which can be considered as features of an object. The paper analyzes the Security log of the operating system after exploiting various vulnerabilities that are popular in the hacker environment. On the data set formed in this way using a machine learning algorithm, a model is built that allows you to further identify objects that have been exposed to unauthorized effect. The scientific novelty consists in creating a way to identify complex computer incidents based on the results of studying the logs of the operating system using a machine learning algorithm.","PeriodicalId":422818,"journal":{"name":"Voprosy kiberbezopasnosti","volume":"17 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Voprosy kiberbezopasnosti","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.21681/2311-3456-2022-5-74-81","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1

Abstract

The aim of the work is to develop a way to identify complex computer incidents carried out by attackers by exploiting vulnerabilities of information systems. The research method is the analysis of entries in the system logs of the Microsoft Windows operating system using the Random Forest machine learning algorithm. The result obtained: despite the wide variety of different types of malicious software used by attackers in conducting computer attacks, they all leave traces of their functioning to the network infrastructure that has been exposed to unauthorized effects. One of the ways to identify computer incidents is to examine the log files of various information systems, including the system logs of the operating system for the identification of hidden patterns and various anomalies. The functioning of any computer program can be represented as a unique set of records in the system logs of the operating system, which can be considered as features of an object. The paper analyzes the Security log of the operating system after exploiting various vulnerabilities that are popular in the hacker environment. On the data set formed in this way using a machine learning algorithm, a model is built that allows you to further identify objects that have been exposed to unauthorized effect. The scientific novelty consists in creating a way to identify complex computer incidents based on the results of studying the logs of the operating system using a machine learning algorithm.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
利用随机森林机器学习算法提取复杂的计算机事件
这项工作的目的是开发一种方法来识别由攻击者利用信息系统漏洞实施的复杂计算机事件。研究方法是使用随机森林机器学习算法对微软Windows操作系统的系统日志条目进行分析。所获得的结果是:尽管攻击者在进行计算机攻击时使用了各种不同类型的恶意软件,但它们都在网络基础设施中留下了其功能的痕迹,这些痕迹已暴露于未经授权的影响之下。识别计算机事件的方法之一是检查各种信息系统的日志文件,包括操作系统的系统日志,以识别隐藏的模式和各种异常。任何计算机程序的功能都可以表示为操作系统系统日志中的一组唯一的记录,这些记录可以被认为是一个对象的特征。本文利用黑客环境中常见的各种漏洞,分析了操作系统的安全日志。在使用机器学习算法以这种方式形成的数据集上,建立一个模型,使您能够进一步识别已暴露于未经授权影响的对象。科学上的新颖性在于创造了一种方法来识别复杂的计算机事件,该方法基于使用机器学习算法研究操作系统日志的结果。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
Model for Building Competencies of a Computer Crime Investigator ASSESSMENT AND PREDICTION OF THE COMPLEX OBJECTS STATE: APPLICATIOIN FOR INFORMATION SECURITY Cellular Automata and Their Generalizations in Cryptography. Part 1 A METHOD OF PARAMETRIC SYNTHESIS OF CRYPTO-CODE STRUCTURES FOR MONITORING AND RESTORING THE INTEGRITY OF INFORMATION Application of Methods of Theory of Fuzzy Sets to Assess the Risk of Violations of Critical Properties Protected Resources Automated Control System
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1