Optimal Machine Learning Algorithms for Cyber Threat Detection

被引:15
|
作者
Farooq, Hafiz M. [1 ]
Otaibi, Naif M. [1 ]
机构
[1] Saudi Aramco, Expec Comp Ctr, Informat Secur Div, Dhahran, Saudi Arabia
关键词
SOC; Machine Learning; Anomaly Detection; Prediction; Classification; Numerical Clustering; Dimensionality; Regression; Decision Trees; Ensemble Learning; Deep Learning;
D O I
10.1109/UKSim.2018.00018
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
With the exponential hike in cyber threats, organizations are now striving for better data mining techniques in order to analyze security logs received from their IT infrastructures to ensure effective and automated cyber threat detection. Machine Learning (ML) based analytics for security machine data is the next emerging trend in cyber security, aimed at mining security data to uncover advanced targeted cyber threats actors and minimizing the operational overheads of maintaining static correlation rules. However, selection of optimal machine learning algorithm for security log analytics still remains an impeding factor against the success of data science in cyber security due to the risk of large number of false-positive detections, especially in the case of large-scale or global Security Operations Center (SOC) environments. This fact brings a dire need for an efficient machine learning based cyber threat detection model, capable of minimizing the false detection rates. In this paper, we are proposing optimal machine learning algorithms with their implementation framework based on analytical and empirical evaluations of gathered results, while using various prediction, classification and forecasting algorithms.
引用
收藏
页码:32 / 37
页数:6
相关论文
共 50 条
  • [1] Cyber Threat Intelligence and Machine Learning
    Haass, Jon C.
    Proceedings - 2022 4th International Conference on Transdisciplinary AI, TransAI 2022, 2022, : 156 - 159
  • [2] Cyber Security: Threat Detection Model based on Machine learning Algorithm
    Dalal, Kushal Rashmikant
    Rele, Mayur
    PROCEEDINGS OF THE 3RD INTERNATIONAL CONFERENCE ON COMMUNICATION AND ELECTRONICS SYSTEMS (ICCES 2018), 2018, : 239 - 243
  • [3] Insider threat detection using supervised machine learning algorithms
    Manoharan, Phavithra
    Yin, Jiao
    Wang, Hua
    Zhang, Yanchun
    Ye, Wenjie
    TELECOMMUNICATION SYSTEMS, 2024, 87 (04) : 899 - 915
  • [4] An intelligent cyber threat detection: A swarm-optimized machine learning approach
    Qiqieh, Issa
    Alzubi, Omar
    Alzubi, Jafar
    Sreedhar, K. C.
    Al-Zoubi, Ala' M.
    ALEXANDRIA ENGINEERING JOURNAL, 2025, 115 : 553 - 563
  • [5] DETECTION AND PREVENTION OF CYBER DEFENSE ATTACKS USING MACHINE LEARNING ALGORITHMS
    Shang, Yongqiang
    SCALABLE COMPUTING-PRACTICE AND EXPERIENCE, 2024, 25 (02): : 760 - 769
  • [6] Detection analysis of malicious cyber attacks using machine learning algorithms
    Karthika, R. A.
    Maheswari, M.
    MATERIALS TODAY-PROCEEDINGS, 2022, 68 : 26 - 34
  • [7] Enhanced Cyber Threat Detection System Leveraging Machine Learning Using Data Augmentation
    Iftikhar, Umar
    Ali, Syed Abbas
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2025, 16 (02) : 218 - 225
  • [8] Cyber Threat Intelligence for IoT Using Machine Learning
    Mishra, Shailendra
    Albarakati, Aiman
    Sharma, Sunil Kumar
    PROCESSES, 2022, 10 (12)
  • [9] Swarm Optimization and Machine Learning Applied to PE Malware Detection towards Cyber Threat Intelligence
    Kattamuri, Santosh Jhansi
    Penmatsa, Ravi Kiran Varma
    Chakravarty, Sujata
    Madabathula, Venkata Sai Pavan
    ELECTRONICS, 2023, 12 (02)
  • [10] Hybrid evolutionary machine learning model for advanced intrusion detection architecture for cyber threat identification
    Sharma, Ankita
    Rani, Shalli
    Driss, Maha
    PLOS ONE, 2024, 19 (09):