Enterprise Network Infrastructure Malicious Activity Analysis
Muhammad Shujat Ali, Ahsan Abbas, Abdullah Faisal, Anza Riaz,Imran Siddiq ()
Additional contact information 
Muhammad Shujat Ali, Ahsan Abbas, Abdullah Faisal, Anza Riaz,Imran Siddiq: Orange Networks, Lahore, Pakistan. Afro-Asian Institute Affiliated with Government College University Faisalabad, Pakistan. Government College University Faisalabad Layyah Campus, Pakistan. Telenor bank,Lahore,Pakistan
International Journal of Innovations in Science & Technology, 2022, vol. 4, issue 4, 982-997
Abstract:
Inter and intra-network connectivity have become a useful resource for accessibility and flexibility of data for different organizations. Online services are increasing day by day, everything is available online, it generates a huge amount of data, that require cyber security revolves for ensuring secure interconnectivity between devices. Because of an exponential increase in internet users and cyber-attacks, the data security and credibility of various organizations is on stake. In the continued development of the threat environment, cyber security experts deal with numerous threats on daily basis. As multiple attacks on computer networks and systems are becoming stronger each day therefore current security tools are often inadequate to resolve issues relating to unauthorized users, reliability, and reliable network security. To maintain a safe environment, Intrusion-Detection Mechanisms (IDS) enabled to control device functions and detect intrusions should typically be used to supplement with other protection strategies; for which conventional security methods are inadequate. Actual users expect their requested information to be processed in real-time, while malicious traffic needs to be mitigated just as quickly as possible. As traffic increases, this problem becomes more complex. This paper contributes a detailed analysis of network packets to find anomaly detection based on the UNSW NB 15 dataset and investigate the the difference between IP packet behavior for both malicious and legitimate packets. Besides we acquaint with new methodologies to illuminate and appraise the network attack in a very proficient way using different machine learning algorithms which will accomplish locating the malicious traffic in the least execution time with precision.
Keywords: Cyber Security; Network Attack; Intrusion-Detection Mechanisms (IDS); Multi-Layer Perceptron (MLP); Distributed Denial-of-Service (DDoS) (search for similar items in EconPapers)
Date: 2022
References: Add references at CitEc 
Citations: 
Downloads: (external link)
https://journal.50sea.com/index.php/IJIST/article/view/410/2337 (application/pdf)
https://journal.50sea.com/index.php/IJIST/article/view/410 (text/html)
Related works:
This item may be available elsewhere in EconPapers: Search for items with the same title.
Export reference: BibTeX 
RIS (EndNote, ProCite, RefMan) 
HTML/Text
Persistent link: https://EconPapers.repec.org/RePEc:abq:ijist1:v:4:y:2022:i:4:p:982-997
Access Statistics for this article
International Journal of Innovations in Science & Technology is currently edited by Prof. Dr. Syed Amer Mahmood
More articles in International Journal of Innovations in Science & Technology  from  50sea
Bibliographic data for series maintained by Iqra Nazeer ().