The development of a model for the threat detection system with the use of machine learning and neural network methods
Olga Ussatova (),
Aidana Zhumabekova (),
Vladislav Karyukin (),
Eric T Matson () and
Nikita Ussatov ()
International Journal of Innovative Research and Scientific Studies, 2024, vol. 7, issue 3, 863-877
Abstract:
This study examines the development of a model for the threat detection system with the use of machine learning and neural network methods. The fast development of Internet technologies has led to the appearance of many digital systems and platforms. However, despite the impressive technological progress, another side also emerged in the spread of a massive number of different cyber threats. Although various ways have been created to detect and prevent them, the threats are also developing and becoming more complex each year. Therefore, new system defense and data protection methods using machine and deep learning approaches have been proposed recently. The methods based on these approaches have proved to be especially effective in the wave of new Artificial Intelligence applications. In this paper, a threat detection system has been designed to disclose different kinds of threats while maintaining the security, confidentiality, and availability of the computer system. The development of machine learning models for detecting DDoS and man-in-the-middle attacks, Structured Query Language (SQL) injections, phishing, and malware was examined. The data scaling, feature selection, feature extraction, and classification steps were also thoroughly described. Naïve Bayes, Logistic Regression, Decision Tree, Random Forest, XGBoost, CatBoost, and Deep Neural Network algorithms were utilized for training the cyber threat detection models. The experimental results evaluated all the models using accuracy, precision, recall, and F1-score metrics. The best models achieved scores in the range of 0.90 to 1.00.
Keywords: Artificial intelligence; Cyberattacks; DDoS; Defence system; Machine learning; Malware; Man-in-the-Middle; Neural networks; Phishing; SQL injection. (search for similar items in EconPapers)
Date: 2024
References: Add references at CitEc
Citations:
Downloads: (external link)
https://ijirss.com/index.php/ijirss/article/view/2957/489 (application/pdf)
Related works:
This item may be available elsewhere in EconPapers: Search for items with the same title.
Export reference: BibTeX
RIS (EndNote, ProCite, RefMan)
HTML/Text
Persistent link: https://EconPapers.repec.org/RePEc:aac:ijirss:v:7:y:2024:i:3:p:863-877:id:2957
Access Statistics for this article
International Journal of Innovative Research and Scientific Studies is currently edited by Natalie Jean
More articles in International Journal of Innovative Research and Scientific Studies from Innovative Research Publishing
Bibliographic data for series maintained by Natalie Jean ().