Enhancing Cybersecurity through Bayesian Node Profiling and Attack Classification

Full Text (PDF, 419KB), PP.43-51

Views: 0 Downloads: 0

Author(s)

Priyanka Desai 1,*

1. Software Engineer and was a Data Scientist in a Fortune 500 company, India

* Corresponding author.

DOI: https://doi.org/10.5815/ijwmt.2024.01.04

Received: 16 Jun. 2023 / Revised: 12 Aug. 2023 / Accepted: 8 Sep. 2023 / Published: 8 Feb. 2024

Index Terms

Node profiling, Intrusion detection, Bayesian theorem, naïve bayes, gaussian naïve bayes (GNB), Decision tree (DT)

Abstract

Due to the epidemic, the majority of users and businesses turned to the internet, necessitating the necessity to preserve the populace and safeguard their data. However, after being attacked, the expense of data protection runs into the millions of dollars. The phrase "Protection is better than cure" is true. The paper deals with profiling the node for safeguarding against the cyberattack. There is a lot of research on network nodes. Here, we address the requirement to profile the node before utilizing machine learning to separate the data. In order to scan the nodes for risks and save the nature of threat as a database, node profiling is being investigated. The data is then classified using a machine learning algorithm utilizing the database. This research focuses on the application of machine learning methods, specifically Gaussian Naive Bayes and Decision Trees, for the segmentation of cyberattacks in streaming data. Given the continuous nature of cyberattack data, Gaussian Naive Bayes is introduced as a suitable approach. The research methodology involves the development and comparison of these methods in classifying detected attacks. The Bayesian method is employed to classify detected attacks, emphasizing the use of Gaussian Naive Bayes due to its adaptability to streaming data. Decision Trees are also discussed and used for comparison in the results section. The research explores the theoretical foundations of these methods and their practical implementation in the context of cyberattack classification. After classification, the paper delves into the crucial task of identifying intrusions in the streaming data. The effectiveness of intrusion detection is highlighted, emphasizing the importance of minimizing false negatives and false positives in a real-world cybersecurity setting. The implementation and results section presents empirical findings based on the application of Gaussian Naive Bayes and Decision Trees to a dataset. Precision, recall, and accuracy metrics are used to evaluate the performance of these methods. The research concludes by discussing the implications of the findings and suggests that Gaussian Naive Bayes is a suitable choice for streaming data due to its adaptability and efficiency. It also emphasizes the need for continuous monitoring and detection of cyberattacks to enhance overall cybersecurity. The paper provides insights into the practical applicability of these methods and suggests future work in the field of intrusion detection.

Cite This Paper

Priyanka Desai, "Enhancing Cybersecurity through Bayesian Node Profiling and Attack Classification", International Journal of Wireless and Microwave Technologies(IJWMT), Vol.14, No.1, pp. 43-51, 2024. DOI:10.5815/ijwmt.2024.01.04

Reference

[1]Alkhalil Zainab et.al,"Phishing Attacks: A Recent Comprehensive Study and a New Anatomy ",Frontiers in Computer Science,Vol-3, 2021, pp6, doi=10.3389/fcomp.2021.563060 .
[2]Steve Ursillo, Jr., Christopher Arnold,"Cybersecurity Is Critical for all Organizations – Large and Small",International Federation of accounts,| November 4, 2019.
[3]Cisco Annual Internet Report (2018–2023) White Paper,March 9, 2020.
[4]Julian Jang-Jaccard, Surya Nepal,"A survey of emerging threats in cybersecurity",Journal of Computer and System Sciences,Volume 80, Issue 5,2014,Pages 973-993,ISSN 0022-0000,https://doi.org/10.1016/j.jcss.2014.02.005.
[5]Julian Jang-Jaccard, Surya Nepal,"A survey of emerging threats in cybersecurity",Journal of Computer and System Sciences,Volume 80, Issue 5,2014,Pages 973-993,ISSN 0022-0000,https://doi.org/10.1016/j.jcss.2014.02.005.
[6]D. Gupta, P. S. Joshi, A. K. Bhattacharjee, and R. S. Mundada, ‘‘IDS alerts classification using knowledge-based evaluation,’’ in Proc. 4th Int. Conf. Commun. Syst. Netw. (COMSNETS), Jan. 2012, pp. 1–8, doi: 10.1109/COMSNETS.2012.6151339.
[7]M. A. Siddiqi, W. Pak, and M. A. Siddiqi, ‘‘A study on the psychology of social engineering-based cyberattacks and existing countermeasures,’’ Appl. Sci., vol. 12, no. 12, p. 6042, Jun. 2022.
[8]Meng, Y., Li, W., Kwok, Lf. (2013). Evaluation of Detecting Malicious Nodes Using Bayesian Model in Wireless Intrusion Detection. In: Lopez, J., Huang, X., Sandhu, R. (eds) Network and System Security. NSS 2013. Lecture Notes in Computer Science, vol 7873. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-38631-2_4 -
[9]Suleiman S. Fawzy, Abeer M. Yousif,2009,'Network Node Intrusion Detection System',Iraqi Journal of Science,Volume 50, Issue 3, Pages 396-402.
[10]Y. Huang, "Network Intrusion Detection Method Based on Naive Bayes Algorithm," 2022 6th Asian Conference on Artificial Intelligence Technology (ACAIT), Changzhou, China, 2022, pp. 1-10, doi: 10.1109/ACAIT56212.2022.10137846.
[11]K. Bajaj and A. Arora, ‘‘Dimension reduction in intrusion detection features using discriminative machine learning approach,’’ Int. J. omput. Sci. Issues, vol. 10, no. 4, p. 324, 2013.
[12]S. N. Murray, B. P. Walsh, D. Kelliher, and D. T. J. O’Sullivan, ‘‘Multi-variable optimization of thermal energy efficiency retrofitting of buildings using static modelling and genetic algorithms—A case study,’’ Building Environ., vol. 75, pp. 98–107, May 2014.
[13]S. Keele et al., ‘‘Guidelines for performing systematic literature reviews in software engineering,’’ Tech. Rep. EBSE 2007-001, Version 2.3, 2007.
[14]N. Kshetri and J. Voas, ‘‘Hacking power grids: A current problem,’’ Computer, vol. 50, no. 12, pp. 91–95, Dec. 2017.
[15]Joaquin Vanschoren," Intrusion detection datasets ACM KDD Cup",1999.