S. R, Sivasundarapandian S, Aranganathan A, V. V, Rajinikanth E, G. T
{"title":"Data scientific approach to detect the DoS attack, Probe attack, R2L attack and U2R attack","authors":"S. R, Sivasundarapandian S, Aranganathan A, V. V, Rajinikanth E, G. T","doi":"10.1109/ACCAI58221.2023.10199636","DOIUrl":null,"url":null,"abstract":"Data reliability is compromised by various cyber-attacks. Computational infrastructure is completely disturbed, broken or guided by these attacks. The current status of cyberspace foretells uncertainty for the future of the Internet and its rising user base. Data collected by the sensors and other input devices can be easily stolen by the unidentified user. It is a severe threat to the programming environment and individual personals. It is necessary to take into account the advanced technologies to counterfeit these cyber-attacks. Existing algorithms are decoded over certain period of time. Because of this always important to adapt the new technology that can prevent cyber-attacks. In this paper, various cyber-attacks predictions are analyzed and combines as a group based on its features. After analyzing the various cyber-attacks and its classification, recent technologies which can prevent the cyber-attack is studied. One of the main technologies that can able to learn themselves is the machine learning. Networking environment must use advanced machine learning approaches to protect the Data. Machine learning technique is classified as supervised and unsupervised technique. Supervised machine learning technique uses features that can be extracted from the source dataset. The most effective machine learning algorithm for predicting the types of cyber-attacks has been determined through a comparison study of different algorithms. We categorize attacks into four categories: R2L attacks, DOS attacks, U2R attacks, and probe attacks. Various machine learning algorithms are applied to detect and rectify the cyber-attacks. Their performances are compared and analyzed in terms of accuracy, F1 score, precision and recall.","PeriodicalId":382104,"journal":{"name":"2023 International Conference on Advances in Computing, Communication and Applied Informatics (ACCAI)","volume":"281 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2023-05-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2023 International Conference on Advances in Computing, Communication and Applied Informatics (ACCAI)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ACCAI58221.2023.10199636","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
Data reliability is compromised by various cyber-attacks. Computational infrastructure is completely disturbed, broken or guided by these attacks. The current status of cyberspace foretells uncertainty for the future of the Internet and its rising user base. Data collected by the sensors and other input devices can be easily stolen by the unidentified user. It is a severe threat to the programming environment and individual personals. It is necessary to take into account the advanced technologies to counterfeit these cyber-attacks. Existing algorithms are decoded over certain period of time. Because of this always important to adapt the new technology that can prevent cyber-attacks. In this paper, various cyber-attacks predictions are analyzed and combines as a group based on its features. After analyzing the various cyber-attacks and its classification, recent technologies which can prevent the cyber-attack is studied. One of the main technologies that can able to learn themselves is the machine learning. Networking environment must use advanced machine learning approaches to protect the Data. Machine learning technique is classified as supervised and unsupervised technique. Supervised machine learning technique uses features that can be extracted from the source dataset. The most effective machine learning algorithm for predicting the types of cyber-attacks has been determined through a comparison study of different algorithms. We categorize attacks into four categories: R2L attacks, DOS attacks, U2R attacks, and probe attacks. Various machine learning algorithms are applied to detect and rectify the cyber-attacks. Their performances are compared and analyzed in terms of accuracy, F1 score, precision and recall.