Data scientific approach to detect the DoS attack, Probe attack, R2L attack and U2R attack

S. R, Sivasundarapandian S, Aranganathan A, V. V, Rajinikanth E, G. T
{"title":"Data scientific approach to detect the DoS attack, Probe attack, R2L attack and U2R attack","authors":"S. R, Sivasundarapandian S, Aranganathan A, V. V, Rajinikanth E, G. T","doi":"10.1109/ACCAI58221.2023.10199636","DOIUrl":null,"url":null,"abstract":"Data reliability is compromised by various cyber-attacks. Computational infrastructure is completely disturbed, broken or guided by these attacks. The current status of cyberspace foretells uncertainty for the future of the Internet and its rising user base. Data collected by the sensors and other input devices can be easily stolen by the unidentified user. It is a severe threat to the programming environment and individual personals. It is necessary to take into account the advanced technologies to counterfeit these cyber-attacks. Existing algorithms are decoded over certain period of time. Because of this always important to adapt the new technology that can prevent cyber-attacks. In this paper, various cyber-attacks predictions are analyzed and combines as a group based on its features. After analyzing the various cyber-attacks and its classification, recent technologies which can prevent the cyber-attack is studied. One of the main technologies that can able to learn themselves is the machine learning. Networking environment must use advanced machine learning approaches to protect the Data. Machine learning technique is classified as supervised and unsupervised technique. Supervised machine learning technique uses features that can be extracted from the source dataset. The most effective machine learning algorithm for predicting the types of cyber-attacks has been determined through a comparison study of different algorithms. We categorize attacks into four categories: R2L attacks, DOS attacks, U2R attacks, and probe attacks. Various machine learning algorithms are applied to detect and rectify the cyber-attacks. Their performances are compared and analyzed in terms of accuracy, F1 score, precision and recall.","PeriodicalId":382104,"journal":{"name":"2023 International Conference on Advances in Computing, Communication and Applied Informatics (ACCAI)","volume":"281 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2023-05-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2023 International Conference on Advances in Computing, Communication and Applied Informatics (ACCAI)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ACCAI58221.2023.10199636","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

Abstract

Data reliability is compromised by various cyber-attacks. Computational infrastructure is completely disturbed, broken or guided by these attacks. The current status of cyberspace foretells uncertainty for the future of the Internet and its rising user base. Data collected by the sensors and other input devices can be easily stolen by the unidentified user. It is a severe threat to the programming environment and individual personals. It is necessary to take into account the advanced technologies to counterfeit these cyber-attacks. Existing algorithms are decoded over certain period of time. Because of this always important to adapt the new technology that can prevent cyber-attacks. In this paper, various cyber-attacks predictions are analyzed and combines as a group based on its features. After analyzing the various cyber-attacks and its classification, recent technologies which can prevent the cyber-attack is studied. One of the main technologies that can able to learn themselves is the machine learning. Networking environment must use advanced machine learning approaches to protect the Data. Machine learning technique is classified as supervised and unsupervised technique. Supervised machine learning technique uses features that can be extracted from the source dataset. The most effective machine learning algorithm for predicting the types of cyber-attacks has been determined through a comparison study of different algorithms. We categorize attacks into four categories: R2L attacks, DOS attacks, U2R attacks, and probe attacks. Various machine learning algorithms are applied to detect and rectify the cyber-attacks. Their performances are compared and analyzed in terms of accuracy, F1 score, precision and recall.
采用数据科学的方法检测DoS攻击、Probe攻击、R2L攻击和U2R攻击
数据可靠性受到各种网络攻击的影响。计算基础设施完全受到这些攻击的干扰、破坏或引导。网络空间的现状预示着互联网未来及其不断增长的用户群的不确定性。传感器和其他输入设备收集的数据很容易被身份不明的用户窃取。这是对编程环境和个人的严重威胁。有必要考虑到先进的技术来伪造这些网络攻击。现有的算法在一定的时间内被解码。因此,采用新的技术来防止网络攻击总是很重要的。本文对各种网络攻击预测进行分析,并根据其特点进行组合。在分析各种网络攻击及其分类的基础上,研究了防范网络攻击的最新技术。能够自我学习的主要技术之一是机器学习。网络环境必须使用先进的机器学习方法来保护数据。机器学习技术分为有监督技术和无监督技术。监督式机器学习技术使用可以从源数据集中提取的特征。通过对不同算法的比较研究,确定了预测网络攻击类型最有效的机器学习算法。我们将攻击分为四类:R2L攻击、DOS攻击、U2R攻击和探测攻击。各种机器学习算法被用于检测和纠正网络攻击。从准确率、F1分数、准确率、召回率等方面对其进行了比较分析。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信