Machine learning enabled system for intelligent classification of host-based intrusion severity

None Anthony Effiong Edet, None Godwin Okon Ansa
{"title":"Machine learning enabled system for intelligent classification of host-based intrusion severity","authors":"None Anthony Effiong Edet, None Godwin Okon Ansa","doi":"10.30574/gjeta.2023.16.3.0171","DOIUrl":null,"url":null,"abstract":"Intrusion severity classification or the analysis of the impact of intrusion is a much needed solution to effectively manage intrusion events in an organization. A lot of intrusion scenarios have been carried out by systems administrators or the internal workers over the years in different organizations and the external hackers are berated for it. Many deliberate inversions have happened from the internal actors with top management board members only swinging into actions to manage the effect of it without digging into the inversion to apprehend the actors or the source of the intrusion. So, this work has been designed to assist IT firms to effectively carry out the analysis of the impact of intrusion, especially those from the internal workers. In this work, we proposed a Machine Learning Enabled System for Intelligent Classification of Host-based Intrusion Severity. The proposed model is aimed at detecting the severity of intrusion problems, carryout source analysis and give security recommendation for effective management of intrusion problems. The model is divided into three phases; the detection of intrusion severity, source analysis and security recommendation using counterfacatual reasoning.We built a system that aided us to gather user interaction over time, we captured these interaction in the activity log, our dataset was extracted from these activity log data.We used Bayesian Network to design the intrusion severity classification system, source analysis is carried out immediately, then counterfactual model is employed to give security recommendation. The accuracy of Bayesian Network in the intrusion severity classification model is 82%. An API was generated and deployed to allow scalability.","PeriodicalId":402125,"journal":{"name":"Global Journal of Engineering and Technology Advances","volume":"64 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2023-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Global Journal of Engineering and Technology Advances","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.30574/gjeta.2023.16.3.0171","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

Abstract

Intrusion severity classification or the analysis of the impact of intrusion is a much needed solution to effectively manage intrusion events in an organization. A lot of intrusion scenarios have been carried out by systems administrators or the internal workers over the years in different organizations and the external hackers are berated for it. Many deliberate inversions have happened from the internal actors with top management board members only swinging into actions to manage the effect of it without digging into the inversion to apprehend the actors or the source of the intrusion. So, this work has been designed to assist IT firms to effectively carry out the analysis of the impact of intrusion, especially those from the internal workers. In this work, we proposed a Machine Learning Enabled System for Intelligent Classification of Host-based Intrusion Severity. The proposed model is aimed at detecting the severity of intrusion problems, carryout source analysis and give security recommendation for effective management of intrusion problems. The model is divided into three phases; the detection of intrusion severity, source analysis and security recommendation using counterfacatual reasoning.We built a system that aided us to gather user interaction over time, we captured these interaction in the activity log, our dataset was extracted from these activity log data.We used Bayesian Network to design the intrusion severity classification system, source analysis is carried out immediately, then counterfactual model is employed to give security recommendation. The accuracy of Bayesian Network in the intrusion severity classification model is 82%. An API was generated and deployed to allow scalability.
支持机器学习的基于主机的入侵严重程度智能分类系统
入侵严重程度分类或入侵影响分析是组织有效管理入侵事件的必要解决方案。多年来,在不同的组织中,系统管理员或内部工作人员实施了大量的入侵场景,外部黑客为此受到了严厉的指责。许多故意的倒置发生在内部行为者身上,高层管理委员会成员只是采取行动来管理它的影响,而没有深入研究倒置来逮捕行为者或入侵的来源。因此,这项工作旨在帮助IT公司有效地对入侵的影响进行分析,特别是来自内部员工的入侵。在这项工作中,我们提出了一个基于机器学习的基于主机的入侵严重程度智能分类系统。该模型旨在检测入侵问题的严重程度,对入侵问题进行来源分析,并给出安全建议,从而有效地管理入侵问题。该模型分为三个阶段;利用反事实推理实现入侵严重程度的检测、源分析和安全建议。我们建立了一个帮助我们收集用户交互的系统,我们在活动日志中捕获这些交互,我们的数据集是从这些活动日志数据中提取的。采用贝叶斯网络设计入侵严重程度分类系统,立即进行源分析,然后采用反事实模型给出安全建议。贝叶斯网络在入侵严重程度分类模型中的准确率达到82%。生成并部署了一个API以支持可伸缩性。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信