Download as pdf or txt
Download as pdf or txt
You are on page 1of 6

Volume 9, Issue 4, April – 2024 International Journal of Innovative Science and Research Technology

ISSN No:-2456-2165 https://doi.org/10.38124/ijisrt/IJISRT24APR705

Predictive Analytics-Enabled Cyber Attack Detection


1
Sahana Susheela; 2N. Sarat Chandra; 3S. Sakthi Priyan
1
Professor
1,2,3
Department of Computer Science (Cyber Security),
Institute of Aeronautical Engineering, Telangana, India

Abstract:- Cyber-attacks are becoming increasingly increasing use of the internet and mobile phones, the number
sophisticated and difficult to detect using traditional of criminal activities has also gained pace. These criminal-
security measures. To address this challenge, we propose minded people steal the personal details of a person, which
a predictive analytics- enabled cyber-attack detection leads to financial losses and damages the reputation of the
system that utilizes machine learning algorithms to victims. Various scams and fraudulent schemes are offered
analyze network traffic and identify potential security on the internet like online auctions, advance fees, or any
threats in real time. Our system uses a combination of investment scam, which are all aimed at deceiving
supervised and unsupervised learning techniques to individuals into parting with their money. The designing of a
identify patterns and anomalies in network data, and to cyber-attack detection system entails the gathering and
generate anomaly and normal alert. The system is analysis of multi-source data, which are network traffic,
trained using historical data from known cyber-attacks system logs, and security events, among others, for model
and anomalies and we visualize the accuracy of various training and development. The system must be maintaining
algorithms. its competence against cyber threats, which may have any
form of scenarios, by incorporating tactics like anomaly
Keywords:- Cyber-Attacks, Machine Learning, Predictive detection and behavioral analysis. Completeness is also
Analytics, Anomalies, Network Data. important as an assessment system should not have a lot of
false positives.
I. INTRODUCTION
II. LITERATURE SURVEY
In an era of unprecedented digital interconnectedness,
organizations worldwide face a formidable challenge: A. Alomair, A. A. Abidin, & M. A. Ali [1]; In the
safeguarding their sensitive data, critical operations, and paper by Alomair et al. (2021), a novel machine learning
hard-earned reputations against a relentless tide of cyber approach is proposed to anticipate and prevent cyberattacks
threats. Adversaries, armed with ever-evolving tactics and targeting industrial control systems (ICS). This method goes
tools, relentlessly probe for vulnerabilities, seeking to beyond traditional signature-based detection by analyzing
infiltrate systems, disrupt operations, and pilfer valuable both process data and network traffic within the ICS
assets. In this intensifying digital battlefield, the ability to environment. By leveraging machine learning algorithms,
swiftly detect and neutralize cyber-attacks has become an the system accurately predicts various potential threats,
indispensable pillar of organizational resilience. The including malware infections, hardware malfunctions, and
increasing frequency and sophistication of cyber-attacks unauthorized access attempts. This proactive approach allows
pose significant threats to the security and integrity of security personnel to implement preventive measures before
computer networks. Organizations need robust systems to attacks can compromise critical components, safeguarding
detect and respond to these attacks promptly. the stability and security of the entire industrial system.
Develops a machine learning-based approach for threat
Traditional rule-based approaches and signature- based prediction in industrial control systems (ICS). Analyzes
systems have limitations in effectively identifying new and process data and network traffic to predict potential
evolving attack patterns. To address this challenge, machine cyberattacks against ICS components. Proposed approach
learning techniqueshave emerged as a promising solution for demonstrates high accuracy in predicting various threats in
cyber- attack detection. ICS environments, enabling proactive security measures.

The goal of this project is to develop a cyber-attack C. Wang, D. Li [2]; In their 2021 study, Wang and Li
detection system using machine learning algorithms. The delve into the realm of deep learning, specifically focusing
system aims to provide real-time monitoring and detection on convolutional neural networks (CNNs), to address the
of malicious activities within network traffic, enabling challenges associated with identifying malicious patterns in
organizations to proactively defend against cyber threats. By network traffic data. Recognizing the increasing
leveraging the power of machine learning, the system can sophistication of cyber threats, the researchers explore the
analyze vast amounts of network data and identify patterns capacity of CNNs to automatically extract relevant features
that indicate potential attacks, including both known and from raw network data, thereby improving the accuracy of
unknown attack types. Cybercrime is a criminal activity done cyber-attack detection. The core of their research lies in the
online using a computer, network and internet. With the application of CNNs, a class of deep learning models

IJISRT24APR705 www.ijisrt.com 1242


Volume 9, Issue 4, April – 2024 International Journal of Innovative Science and Research Technology
ISSN No:-2456-2165 https://doi.org/10.38124/ijisrt/IJISRT24APR705

originally designed for image analysis but adapted here for range of methodologies and techniques applied to address the
the analysis of temporal sequences present in network traffic unique challenges posed by cloud environments. They delve
data. The researchers preprocess and feed network traffic into the nuances of unsupervised learning, emphasizing its
data into the CNN architecture, allowing the model to relevance in detecting deviations from normal behaviour
automatically learn hierarchical representations offeatures. without the need for labelled training data. The review
synthesizes key findings from various studies, highlighting
G. Kim, S. Park [3]; In their 2021 study, Kim and Park the efficacy of unsupervised machine learning in identifying
investigate dynamic behavioral profiling as a means of novel threats and abnormalities in the dynamic and scalable
enhancing cyber threat detection through machine learning. nature of cloud infrastructures. The authors discuss
The researchers focus on creating a comprehensive dataset prominent approaches such as clustering, density-based
capturing diverse user behaviors in real-time. Leveraging methods, and dimensionality reduction techniques employed
unsupervised learning algorithms, they employ clustering in anomaly detection within cloud environments. The
techniques to identify normal behavioral patterns and detect review encapsulates the evolution of techniques over time,
deviations that could signify potential cyber threats. The considering advancements in cloud technologies and the
methodology involves extracting a variety of behavioral increasing sophistication of cyber threats. Moreover, the
features, such as login times, file access frequencies, and paper underscores the importance of adapting unsupervised
application usage, to construct a dynamic behavioral profile machine learning models to the specific characteristics of
for each user. Their results indicate the effectiveness of this cloud infrastructures, considering factors like elasticity,
approach in providing timely and accurate detection of virtualization, anddistributed architectures.
anomalous activities, demonstrating the potential of dynamic
behavioral profiling as a robust technique in cyber threat III. METHODOLOGY
detection.
Initially, objectives and scope will be determined to
H. Patel, R. Gupta [4]; Patel and Gupta's 2021 research define goals and border of the system that covers types of
focuses on developing a Deep Learning- Based Intrusion attacks and data sources that are included. It's substantiated
Detection System (IDS) tailored for Industrial Control next with the extensive data collection and pruning phase
Systems (ICS). Their methodology involves the creation of a encompassing the extraction of historical cyber attacks data
specialized dataset comprising network traffic and appearing in logs and traffic flows, cleaning, preprocessing,
operational data from industrial environments. Employing and feature engineering. As the data is prepared, models of
recurrent neural networks (RNNs) and long short- term appropriate predictive analytics are chosen and built.
memory (LSTM) networks, the researchers aim to capture Training and validation of these models are then carried out
temporal dependencies and sequence patterns within ICS in order to make sure they are capable of timely and reliable
data. The IDS is trained on this data to distinguish between detection of cyber attacks. As a result, thevery best out of the
normal operational behavior and potential intrusions. The models is picked, and then deployed into the existing cyber
study demonstrates that the proposed deep learning security setup after making sure the privacy of data and
approach exhibits superior accuracy in identifying compatibility with the setup is done. Continuous monitoring
anomalies within industrial networks, showcasing its of the existing system enables to identify anomalies and
potential for securing critical infrastructure systems against threats in real time, with vertical feedback mechanisms in
cyber threats. place, to offer the system with ongoing fixes and
readjustment addressed to the ever-evolving threats. During
Luo, Y., Zhou, M., & Xu, G. [5]; Luo et al. (2020) this process, the dissemination and response to questions are
tackle the challenge of detecting anomalies in industrial quite critical for keeping in line transparency, cooperation,
sensor data using a one-class Support Vector Machine and educated preferences among the stakeholders. Through
(OCSVM). Traditional anomaly detection methods often the application of this strategy, companies will be able to
struggle with limited labeled data in industrial settings. originate robust Predictive Analytics-Enabled Cyber Attack
OCSVM overcomes this by building a model of normal data Detection systems which will in turn build their cybersecurity
based on unlabeled sensor readings. Any data point capabilities and minimize risks safely and efficiently.
significantly deviating from this model is flagged as
anomalous, potentially indicating equipment malfunctions, In the context of Predictive Analytics-Enabled cyber-
cyberattacks, or unusual process behavior. This allows for attack detection, machine learning algorithms play a crucial
proactive maintenance andearly detection of security threats, role in identifying anomalies. Certain algorithms/methods of
enhancing industrial process stability and safeguarding learning are use in order to achieve the result and they are:
against costly downtime. While the approach excels in K-Nearest Neighbor (KNN), Logistic Regression, Decision
identifying anomalies without relying on attack signatures, Tree Classifier.
its effectiveness depends heavily on the quality and variety
of collected sensor data.  Proposed System:
In this Project, we are going to use K-nearest
M. A. Alayba, M. Anbar, & P. C. Shah.[6]; conduct a Neighbor, Logical Regression, Decision tree machine
comprehensive review in their 2021 paper, focusing on algorithms to train a model dataset and we use that trained
anomaly detection in cloud infrastructures through the lens model to detect anomalies and using visualization we
of unsupervised machine learning. The authors explore a represent in the form of graph. The project extends beyond

IJISRT24APR705 www.ijisrt.com 1243


Volume 9, Issue 4, April – 2024 International Journal of Innovative Science and Research Technology
ISSN No:-2456-2165 https://doi.org/10.38124/ijisrt/IJISRT24APR705

model development by incorporating a user-friendly website Regression and DecisionTree


interface. This platform allows users to effortlessly upload  The testing and Evaluation Module: here we test
their collected datasets, initiating the prediction process for evaluate the results.
harmful data packets. The system then generates a separate
dataset, isolating instances identified as anomalies. This IV. IMPLEMENTATION ALGORITHM
dual-dataset approach provides users with a clear distinction
between normal and potentially threatening data, facilitating A. Data Collection and Preprocessing Module:
more targeted analysis and response strategies.
 Data Gathering: Collect and curate a diverse dataset of
A key feature of the project involves the utilization of network related tonetwork traffic.
visualization techniques to represent the detected anomalies  Data Preprocessing: Standardize, clean,and preprocess
in a graphical format. Graphs serve as a powerful tool for the data to ensureuniformity, proper formatting, and
conveying complex information, offering a visual snapshot resolution for model input.
of the anomalies identified by the trained model. This
graphical representation enhances the interpretability of the B. Model Training Module:
results, allowing stakeholders to quickly grasp the extent and
distribution of potential threats within the dataset.
 Training Setup: Train the KNN, Logistic Regression
and Decision Tree models using the prepared dataset,
 Modules:
employing techniques like data augmentation to improve
To implement this project, we have designed following
model generalization.
modules.
C. The Testing and Evaluation Module:
 Data collection: using this module we will load data into
system  This module ensures that the deployed system performs
 Preprocessing: Using the module, we will read data for effectively and accuratelyidentifies cyber threats.
processing
 Model generation: Building the model -KNN, Logistic

V. RESULTS

Fig 1: Prediction Interface

IJISRT24APR705 www.ijisrt.com 1244


Volume 9, Issue 4, April – 2024 International Journal of Innovative Science and Research Technology
ISSN No:-2456-2165 https://doi.org/10.38124/ijisrt/IJISRT24APR705

Fig 2: Dataset Entry

Fig 3: KNN Score

IJISRT24APR705 www.ijisrt.com 1245


Volume 9, Issue 4, April – 2024 International Journal of Innovative Science and Research Technology
ISSN No:-2456-2165 https://doi.org/10.38124/ijisrt/IJISRT24APR705

Fig 4: Logistic Regression Score

Fig 5: Decision Tree Score

Fig 6: Prediction Result

IJISRT24APR705 www.ijisrt.com 1246


Volume 9, Issue 4, April – 2024 International Journal of Innovative Science and Research Technology
ISSN No:-2456-2165 https://doi.org/10.38124/ijisrt/IJISRT24APR705

VI. CONCLUSION [7]. Nguyen, N. C., Huynh, Y. N., & Tran, M. T. (2021). A
hybrid intelligent approach for network intrusion
In Conclusion, this project is a major stride in the field detection using k- means clustering and support
of cyber security using machine learning algorithms such as vector machine. International Journal of Machine
K-nearest Neighbor and Logistic Regression techniques Learning and Cybernetics, 12(8), 2967-2984.
which enhance defense against possible Cyber threats. [8]. S. More, M. Matthews, A. Joshi, T. Finin, A
Adopting a wide variety of these algorithms also supports an knowledge-based approach to intrusion detection
effective and rigorous anomaly detection policy that allows modeling, in: IEEE Symposium on Security and
the system to identify small deviations from normal patterns Privacy Workshops, San Francisco, CA, USA, IEEE,
pointing toward malicious activities. The model training 2012, pp. 75–81.
phase, using a good curated data set ensures that the [9]. Umara Noora, c, Zahid Anwara, b, Tehmina Amjadc,
predictive analytics models can differentiate normal and Kim-Kwang Raymond Chood, “A machine learning-
harmful packets represent whereby forming part of proactive based FinTech cyber threat attribution framework
detection cyber-attacks by this system. This interface enables using high-level indicators ofcompromise”, 2019
the users to upload their datasets and get them ready for [10]. Wang, C., & Li, D. (2021). "Deep Learning
prediction, which democratizes these practices by providing Approaches for Cyber Attack Detection: A Case
access to advanced cybersecurity tools. Producing a separate Study with Convolutional Neural Networks."
dataset tailored specifically toward anomalies offers an International Journal of Information Security, 27(2),
efficient and concentrated analysis lens to determine 89-104.
response strategies thus contributing towards more targeted, [11]. W. Wang, Y. Sheng and J. Wang, "HAST-IDS:
optimal cyber security stance. This project is characterized Learning hierarchical spatial temporal features using
by its use of visualization techniques whereby the detected deep neural networks to improve intrusion
abnormalities are displayed in graphical form. The trained detection," IEEE Access, vol. 6, no. 99, pp. 1792-
model pinpoints the anomalies that it has identified, and 1806, 2018
these graphs serve an intuitive powerful communication [12]. X. Zhang, M. Liu, L. Wu, L. Zhou, & X. Hu. (2021).
medium for stakeholders – a visual story of what turned out Anomaly detection in financial transactions based on
to be unusual. This graphical representation does not only deep learning with feature selection. Applied Soft
improve the interpretability of results but also allows a rapid Computing, 101, 107005.
decision-making process as through it, we can quickly [13]. Y. Li, M. A. El-Baz, & S. Li. (2020). Unsupervised
obtain potential threatsin our dataset. The visualizations then anomaly detection using deep learning for wireless
become an essential tool for cybersecurity analysts and sensornetworks. Sensors, 20(18), 5205.
decision-makers, enabling them to quickly identify patterns, [14]. Zhang, Kuan, et al. "Sybil attacks and their defenses
trends as also abnormalities from the data presented. in the internet of things." IEEE Internet of Things
Journal 1.5 (2014)
REFERENCES [15]. Z. Xu, S. Li, S. Zhang, M. Li, & X. Zeng. (2020).
Anomaly detection in traffic video based on temporal
[1]. Alomair, A. A., Abidin, A. A., & Ali, M. (2021). and spatial information fusion. IEEE Transactions
Machine learning-based threat prediction in industrial on Intelligent Transportation Systems, 22(1), 256-
control systems. Journal of Systems and Applications 267.
andInformation Technology, 11(2), 379-390. [16]. Zhang, X., & Chen, Y. (2021). "Hybrid Model for
[2]. C Wang, & Li, D. (2021). "Deep Learning Cyber Attack Detection: Integrating Anomaly and
Approaches for Cyber Attack Detection: A Case Signature- Based Approaches." Computers &
Study with Convolutional Neural Networks." Security, 35(4), 321-335.
International Journal of Information Security, 27(2),
89-104.
[3]. G. Kim, S. Park (2021). "Dynamic Behavioral
Profiling for Cyber Threat Detection using Machine
Learning." Journal of Cybersecurity Research, 18(1),
52-65.
[4]. H. Patel, R. Gupta (2021). "Deep Learning-Based
Intrusion Detection System for Industrial Control
Systems." International Journal of Critical
Infrastructure Protection, 25, 112-125.
[5]. Luo, Y., Zhou, M., & Xu, G. (2020). Industrial
sensor data anomaly detection based on one-class
support vector machine. IEEE Sensors Journal,
20(13), 7505-7513.
[6]. M. A. Alayba, M. Anbar, & P. C. Shah. (2021).
Anomaly detection in cloud infrastructures using
unsupervisedmachine learning: A review. Journal of
Network and Computer Applications, 174, 102815.

IJISRT24APR705 www.ijisrt.com 1247

You might also like