EconPapers    
Economics at your fingertips  
 

The development of a model for the threat detection system with the use of machine learning and neural network methods

Olga Ussatova (), Aidana Zhumabekova (), Vladislav Karyukin (), Eric T Matson () and Nikita Ussatov ()

International Journal of Innovative Research and Scientific Studies, 2024, vol. 7, issue 3, 863-877

Abstract: This study examines the development of a model for the threat detection system with the use of machine learning and neural network methods. The fast development of Internet technologies has led to the appearance of many digital systems and platforms. However, despite the impressive technological progress, another side also emerged in the spread of a massive number of different cyber threats. Although various ways have been created to detect and prevent them, the threats are also developing and becoming more complex each year. Therefore, new system defense and data protection methods using machine and deep learning approaches have been proposed recently. The methods based on these approaches have proved to be especially effective in the wave of new Artificial Intelligence applications. In this paper, a threat detection system has been designed to disclose different kinds of threats while maintaining the security, confidentiality, and availability of the computer system. The development of machine learning models for detecting DDoS and man-in-the-middle attacks, Structured Query Language (SQL) injections, phishing, and malware was examined. The data scaling, feature selection, feature extraction, and classification steps were also thoroughly described. Naïve Bayes, Logistic Regression, Decision Tree, Random Forest, XGBoost, CatBoost, and Deep Neural Network algorithms were utilized for training the cyber threat detection models. The experimental results evaluated all the models using accuracy, precision, recall, and F1-score metrics. The best models achieved scores in the range of 0.90 to 1.00.

Keywords: Artificial intelligence; Cyberattacks; DDoS; Defence system; Machine learning; Malware; Man-in-the-Middle; Neural networks; Phishing; SQL injection. (search for similar items in EconPapers)
Date: 2024
References: Add references at CitEc
Citations:

Downloads: (external link)
https://ijirss.com/index.php/ijirss/article/view/2957/489 (application/pdf)

Related works:
This item may be available elsewhere in EconPapers: Search for items with the same title.

Export reference: BibTeX RIS (EndNote, ProCite, RefMan) HTML/Text

Persistent link: https://EconPapers.repec.org/RePEc:aac:ijirss:v:7:y:2024:i:3:p:863-877:id:2957

Access Statistics for this article

International Journal of Innovative Research and Scientific Studies is currently edited by Natalie Jean

More articles in International Journal of Innovative Research and Scientific Studies from Innovative Research Publishing
Bibliographic data for series maintained by Natalie Jean ().

 
Page updated 2025-03-19
Handle: RePEc:aac:ijirss:v:7:y:2024:i:3:p:863-877:id:2957