Analyse and Predict the Detection of the Cyber - Attack Process by Using a Machine-Learning Approach

Authors

  • Charanjeet Singh Deenbandhu Chhotu Ram University of Science and Technology image/svg+xml
  • Ravinjit Singh Akademi Laut Malaysia
  • Shivaputra Dr Ambedkar Institute of Tehcnology
  • Mohit Tiwari Bharati Vidyapeeth's College of Engineering
  • Bramah Hazela Amity University image/svg+xml

DOI:

https://doi.org/10.4108/eetiot.5345

Keywords:

Machine Learning, Cyber-attacks, Cybercrime, SVM

Abstract

Crimes committed online rank among the most critical global concerns. Daily, they cause country and citizen economies to suffer massive financial losses. With the proliferation of cyber-attacks, cybercrime has also been on the rise. To effectively combat cybercrime, it is essential to identify its perpetrators and understand their methods. Identifying and preventing cyber-attacks are difficult tasks. To combat these concerns, however, new research has produced safety models and forecast tools grounded on artificial intelligence. Numerous methods for predicting criminal behaviour are available in the literature. While they may not be perfect, they may help in cybercrime and cyber-attack tactic prediction. To find out whether an attack happened and, if so, who was responsible, one way to look at this problem is by using real-world data. There is data about the crime, the perpetrator's demographics, the amount of property damaged, and the entry points for the assault. Potentially, by submitting applications to forensics teams, victims of cyber-attacks may get information. This study uses ML methods to analyse cyber-crime consuming two patterns and to forecast how the specified characteristics will furnish to the detection of the cyber-attack methodology and perpetrator. Based on the comparison of eight distinct machine-learning methods, one can say that their accuracy was quite comparable. The Support Vector Machine (SVM) Linear outperformed all other cyber-attack tactics in terms of accuracy. The initial model gave us a decent notion of the assaults that the victims would face. The most successful technique for detecting malevolent actors was logistic regression, according to the success rate. To anticipate who the perpetrator and victim would be, the second model compared their traits.  A person’s chances of being a victim of a cyber-attack decrease as their income and level of education rise. The proposed idea is expected to be used by departments dealing with cybercrime. Cyber-attack identification will also be made easier, and the fight against them will be more efficient.

Downloads

Download data is not yet available.
<br data-mce-bogus="1"> <br data-mce-bogus="1">

References

Bilen, Abdulkadir & Özer, Ahmet. (2021). Cyber-attack method and perpetrator prediction using machine learning algorithms. PeerJ Computer Science. 7. e475. 10.7717/peerj-cs.475. DOI: https://doi.org/10.7717/peerj-cs.475

Al-majed, Rasha & Ibrahim, Amer & Abualkishik, Abedallah & Mourad, Nahia & Almansour, Faris. (2022). Using machine learning algorithm for detection of cyber-attacks in cyber physical systems. Periodicals of Engineering and Natural Sciences (PEN). 10. 261. 10.21533/pen.v10i3.3035. DOI: https://doi.org/10.21533/pen.v10i3.3035

Mazhar, T.; Irfan, H.M.; Khan, S.; Haq, I.; Ullah, I.; Iqbal, M.; Hamam, H. Analysis of Cyber Security Attacks and Its Solutions for the Smart grid Using Machine Learning and Blockchain Methods. Future Internet 2023, 15, 83. https://doi.org/10.3390/fi15020083 DOI: https://doi.org/10.3390/fi15020083

Sarker, I.H. Machine Learning for Intelligent Data Analysis and Automation in Cybersecurity: Current and Future Prospects. Ann. Data. Sci. (2022). https://doi.org/10.1007/s40745-022-00444-2 DOI: https://doi.org/10.20944/preprints202209.0032.v1

A. Alshehri, N. Khan, A. Alowayr and M. Yahya Alghamdi, "Cyberattack detection framework using machine learning and user behavior analytics," Computer Systems Science and Engineering, vol. 44, no.2, pp. 1679–1689, 2023. DOI: https://doi.org/10.32604/csse.2023.026526

Amjad Rehman, Tanzila Saba, Muhammad Zeeshan Khan, Robertas Damaševičius, Saeed Ali Bahaj, "Internet-of-Things-Based Suspicious Activity Recognition Using Multimodalities of Computer Vision for Smart City Security", Security and Communication Networks, vol. 2022, Article ID 8383461, 12 pages, 2022. https://doi.org/10.1155/2022/8383461 DOI: https://doi.org/10.1155/2022/8383461

Liu Qiang, Qu Xiaoli, Wang Dake, Abbas Jaffar, Mubeen Riaqa, Product Market Competition and Firm Performance: Business Survival Through Innovation and Entrepreneurial Orientation Amid COVID-19 Financial Crisis, Frontiers in Psychology, 12 , 2022, ISSN-1664-1078, 10.3389/fpsyg.2021.790923. DOI: https://doi.org/10.3389/fpsyg.2021.790923

URL=https://www.frontiersin.org/articles/10.3389/fpsyg.2021.790923

Ibor, A.E., Oladeji, F.A., Okunoye, O.B. et al. Conceptualisation of Cyberattack prediction with deep learning. Cybersecur 3, 14 (2020). https://doi.org/10.1186/s42400-020-00053-7 DOI: https://doi.org/10.1186/s42400-020-00053-7

Yirui Wu, Dabao Wei, Jun Feng, "Network Attacks Detection Methods Based on Deep Learning Techniques: A Survey", Security and Communication Networks, vol. 2020, Article ID 8872923, 17 pages, 2020. https://doi.org/10.1155/2020/8872923 DOI: https://doi.org/10.1155/2020/8872923

Delplace, Antoine, Sheryl Hermoso, and Kristofer Anandita. "Cyber-attack detection thanks to machine learning algorithms." arXiv preprint arXiv: 2001.06309 (2020).

McCarthy A, Ghadafi E, Andriotis P and Legg P. (2023). Defending against adversarial machine learning attacks using hierarchical learning. Journal of Information Security and Applications. 72: C. DOI: https://doi.org/10.1016/j.jisa.2022.103398

Ahsan, M.; Nygard, K.E.; Gomes, R.; Chowdhury, M.M.; Rifat, N.; Connolly, J.F. Machine Learning Techniques in Cybersecurity. Encyclopedia. Available online: https://encyclopedia.pub/entry/25675 (accessed on 30 April 2023).

Kenfack, P.D.B., Mbakop, F.K. and Eyong-Ebai, E. (2021) Implementation of Machine Learning Method for the Detection and Prevention of Attack in Supervised Network. Open Access Library Journal, 8, 1-25. doi: 10.4236/oalib.1108000. DOI: https://doi.org/10.4236/oalib.1108000

AlZubi, Ahmad Ali, Mohammed Al-Maitah, and Abdulaziz Alarifi. "Cyber-attack detection in healthcare using cyber-physical system and machine learning techniques." Soft Computing 25.18 (2021): 12319-12332. DOI: https://doi.org/10.1007/s00500-021-05926-8

Zhao L, Zhu D, Shafik W, et al. Artificial intelligence analysis in cyber domain: A review. International Journal of Distributed Sensor Networks. 2022; 18(4). doi:10.1177/15501329221084882 DOI: https://doi.org/10.1177/15501329221084882

Narayan, Valliammal, and Barani Shaju. "Malware and Anomaly Detection Using Machine Learning and Deep Learning Methods." Research Anthology on Machine Learning Techniques, Methods, and Applications, edited by Information Resources Management Association, IGI Global, 2022, pp. 149-176. https://doi.org/10.4018/978-1-6684-6291-1.ch010 DOI: https://doi.org/10.4018/978-1-6684-6291-1.ch010

Ahmad Naim Irfan, Suriayati Chuprat, Mohd Naz'ri Mahrin, Aswami Ariffin. (2022) Taxonomy of Cyber Threat Intelligence Framework. 2022 13th International Conference on Information and Communication Technology Convergence (ICTC), pages 1295-1300. DOI: https://doi.org/10.1109/ICTC55196.2022.9952616

Aksu, Dogukan, and M. Ali Aydin. "Detecting port scan attempts with comparative analysis of deep learning and support vector machine algorithms." 2018 International congress on big data, deep learning and fighting cyber terrorism (IBIGDELFT). IEEE, 2018. DOI: https://doi.org/10.1109/IBIGDELFT.2018.8625370

Khuphiran, Panida, et al. "Performance comparison of machine learning models for DDoS attacks detection." 2018 22nd International Computer Science and Engineering Conference (ICSEC). IEEE, 2018. DOI: https://doi.org/10.1109/ICSEC.2018.8712757

Arshey, M., and KS Angel Viji. "Thwarting cyber-crime and phishing attacks with machine learning: a study." 2021 7th international conference on advanced computing and communication systems (ICACCS). Vol. 1. IEEE, 2021. DOI: https://doi.org/10.1109/ICACCS51430.2021.9441925

Shivlal Mewada, Anil Saroliya, N. Chandramouli, T. Rajasanthosh Kumar, M. Lakshmi, S. Suma Christal Mary, Mani Jayakumar, "Smart Diagnostic Expert System for Defect in Forging Process by Using Machine Learning Process", Journal of Nanomaterials, vol. 2022, Article ID 2567194, 8 pages, 2022. https://doi.org/10.1155/2022/2567194 DOI: https://doi.org/10.1155/2022/2567194

Rege, Manjeet, and Raymond Blanch K. Mbah. "Machine learning for cyber defense and attack." Data Analytics 2018 (2018): 83.

P. Patro, R. Azhagumurugan, R. Sathya, K. Kumar, T. R. Kumar and M. V. S. Babu, "A hybrid approach estimates the real-time health state of a bearing by accelerated degradation tests, Machine learning," 2021 Second International Conference on Smart Technologies in Computing, Electrical and Electronics (ICSTCEE), Bengaluru, India, 2021, pp. 1-9, doi: 10.1109/ICSTCEE54422.2021.9708591. DOI: https://doi.org/10.1109/ICSTCEE54422.2021.9708591

Choudhary, Atul S., Pankaj P. Choudhary, and Shrikant Salve. "A Study on Various Cyber Attacks and a Proposed Intelligent System for Monitoring Such Attacks." 2018 3rd International Conference on Inventive Computation Technologies (ICICT). IEEE, 2018. DOI: https://doi.org/10.1109/ICICT43934.2018.9034445

Kumari, Maya. "Application of Machine Learning and Deep Learning in Cybercrime Prevention—A Study." Int. J. Trend Res. Dev (2019): 1-4.

Saharkhizan, Mahdis, et al. "An ensemble of deep recurrent neural networks for detecting IoT cyber-attacks using network traffic." IEEE Internet of Things Journal 7.9 (2020): 8852-8859. DOI: https://doi.org/10.1109/JIOT.2020.2996425

Swaminathan, Aravind, et al. "Prediction of Cyber-attacks and Criminality Using Machine Learning Algorithms." 2022 International Conference on Innovation and Intelligence for Informatics, Computing, and Technologies (3ICT). IEEE, 2022. DOI: https://doi.org/10.1109/3ICT56508.2022.9990652

Ghosh, H., Tusher, M.A., Rahat, I.S., Khasim, S., Mohanty, S.N. (2023). Water Quality Assessment Through Predictive Machine Learning. In: Intelligent Computing and Networking. IC-ICN 2023. Lecture Notes in Networks and Systems, vol 699. Springer, Singapore. https://doi.org/10.1007/978-981-99-3177-4_6 DOI: https://doi.org/10.1007/978-981-99-3177-4_6

Rahat IS, Ghosh H, Shaik K, Khasim S, Rajaram G. Unraveling the Heterogeneity of Lower-Grade Gliomas: Deep Learning-Assisted Flair Segmentation and Genomic Analysis of Brain MR Images. EAI Endorsed Trans Perv Health Tech [Internet]. 2023 Sep. 29 [cited 2023 Oct. 2];9. https://doi.org/10.4108/eetpht.9.4016 DOI: https://doi.org/10.4108/eetpht.9.4016

Ghosh H, Rahat IS, Shaik K, Khasim S, Yesubabu M. Potato Leaf Disease Recognition and Prediction using Convolutional Neural Networks. EAI Endorsed Scal Inf Syst [Internet]. 2023 Sep. 21 https://doi.org/10.4108/eetsis.3937 DOI: https://doi.org/10.4108/eetsis.3937

Downloads

Published

08-03-2024

How to Cite

[1]
C. Singh, R. Singh, Shivaputra, M. Tiwari, and B. Hazela, “Analyse and Predict the Detection of the Cyber - Attack Process by Using a Machine-Learning Approach”, EAI Endorsed Trans IoT, vol. 10, Mar. 2024.

Most read articles by the same author(s)