Analyze and Forecast the Cyber Attack Detection Process using Machine Learning Techniques

Nrusimhadri Sai Deepak, T. Hanitha, Kiranmai Tanniru, Lukka Raj Kiran, Dr. N.Raghavendra Sai, Dr. M. Jogendra Kumar
{"title":"Analyze and Forecast the Cyber Attack Detection Process using Machine Learning Techniques","authors":"Nrusimhadri Sai Deepak, T. Hanitha, Kiranmai Tanniru, Lukka Raj Kiran, Dr. N.Raghavendra Sai, Dr. M. Jogendra Kumar","doi":"10.1109/ICESC57686.2023.10193289","DOIUrl":null,"url":null,"abstract":"One of the most crucial global concerns is the issue of cybercrime, which leads to significant financial losses for nations and their citizens every day. The frequency of cyberattacks has steadily increased, emphasizing the need to identify the individuals behind these criminal activities and understand their strategies. Detecting and preventing cyberattacks pose significant challenges, but recent advancements have introduced security models and prediction tools based on artificial intelligence to tackle these issues. Although there is a wealth of literature on crime prediction strategies, they may need to be more effectively suited for awaiting cybercrime and cyber-attack techniques. One potential solution to address this problem involves utilizing real-world data to determine the occurrence of an attack and identify the responsible party. This information encompasses details about the offense, offender demographics, property damage, and attack vectors. Forensic teams can collect information from victims of cyber-attacks through application processes. This research study employs machine learning techniques to analyze cybercrime using two models and predict how the attributes can contribute to identifying the method of cyber-attack and the criminal. This study has compared eight different machine-learning techniques, and discovered that they yielded similar results in terms of accuracy. The Support Vector Machine (SVM) linear model achieved the highest accuracy rate among the various cyber-attack methods tested. In the first model, valuable insights on the types of attacks victims were likely to face. Logistic regression, with a high success rate, was the most effective strategy for identifying malicious actors. The second model focused on comparing offender and victim attributes to make predictions regarding identification. Our findings indicate that the likelihood of becoming a victim of cyberattacks decreases with higher levels of education and wealth. This proposed concept is eagerly estimated for implementation by cybercrime departments, as it will simplify the detection of cyber-attacks and enhance the efficiency of the battle against them.","PeriodicalId":235381,"journal":{"name":"2023 4th International Conference on Electronics and Sustainable Communication Systems (ICESC)","volume":null,"pages":null},"PeriodicalIF":0.0000,"publicationDate":"2023-07-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2023 4th International Conference on Electronics and Sustainable Communication Systems (ICESC)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICESC57686.2023.10193289","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

Abstract

One of the most crucial global concerns is the issue of cybercrime, which leads to significant financial losses for nations and their citizens every day. The frequency of cyberattacks has steadily increased, emphasizing the need to identify the individuals behind these criminal activities and understand their strategies. Detecting and preventing cyberattacks pose significant challenges, but recent advancements have introduced security models and prediction tools based on artificial intelligence to tackle these issues. Although there is a wealth of literature on crime prediction strategies, they may need to be more effectively suited for awaiting cybercrime and cyber-attack techniques. One potential solution to address this problem involves utilizing real-world data to determine the occurrence of an attack and identify the responsible party. This information encompasses details about the offense, offender demographics, property damage, and attack vectors. Forensic teams can collect information from victims of cyber-attacks through application processes. This research study employs machine learning techniques to analyze cybercrime using two models and predict how the attributes can contribute to identifying the method of cyber-attack and the criminal. This study has compared eight different machine-learning techniques, and discovered that they yielded similar results in terms of accuracy. The Support Vector Machine (SVM) linear model achieved the highest accuracy rate among the various cyber-attack methods tested. In the first model, valuable insights on the types of attacks victims were likely to face. Logistic regression, with a high success rate, was the most effective strategy for identifying malicious actors. The second model focused on comparing offender and victim attributes to make predictions regarding identification. Our findings indicate that the likelihood of becoming a victim of cyberattacks decreases with higher levels of education and wealth. This proposed concept is eagerly estimated for implementation by cybercrime departments, as it will simplify the detection of cyber-attacks and enhance the efficiency of the battle against them.
使用机器学习技术分析和预测网络攻击检测过程
全球最关注的问题之一是网络犯罪问题,它每天都会给国家及其公民带来重大的经济损失。网络攻击的频率稳步增加,强调了识别这些犯罪活动背后的个人并了解其策略的必要性。检测和预防网络攻击构成了重大挑战,但最近的进展已经引入了基于人工智能的安全模型和预测工具来解决这些问题。尽管关于犯罪预测策略的文献非常丰富,但它们可能需要更有效地适用于等待网络犯罪和网络攻击技术。解决此问题的一个潜在解决方案涉及利用真实世界的数据来确定攻击的发生并确定责任方。这些信息包括有关犯罪、罪犯人口统计、财产损失和攻击向量的详细信息。法医小组可以通过应用程序流程收集网络攻击受害者的信息。本研究采用机器学习技术,使用两种模型分析网络犯罪,并预测属性如何有助于识别网络攻击方法和罪犯。这项研究比较了八种不同的机器学习技术,发现它们在准确性方面产生了相似的结果。在测试的各种网络攻击方法中,支持向量机线性模型的准确率最高。在第一个模型中,有关于受害者可能面临的攻击类型的宝贵见解。逻辑回归是识别恶意行为者最有效的策略,成功率高。第二个模型侧重于比较罪犯和受害者的属性,从而对身份识别做出预测。我们的研究结果表明,受教育程度和财富水平越高,成为网络攻击受害者的可能性就越低。这一建议的概念迫切需要网络罪案部门实施,因为它将简化对网络攻击的检测,并提高打击网络攻击的效率。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信