Optimal Machine Learning Algorithms for Cyber Threat Detection

被引:11
|
作者
Farooq, Hafiz M. [1 ]
Otaibi, Naif M. [1 ]
机构
[1] Saudi Aramco, Expec Comp Ctr, Informat Secur Div, Dhahran, Saudi Arabia
关键词
SOC; Machine Learning; Anomaly Detection; Prediction; Classification; Numerical Clustering; Dimensionality; Regression; Decision Trees; Ensemble Learning; Deep Learning;
D O I
10.1109/UKSim.2018.00018
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
With the exponential hike in cyber threats, organizations are now striving for better data mining techniques in order to analyze security logs received from their IT infrastructures to ensure effective and automated cyber threat detection. Machine Learning (ML) based analytics for security machine data is the next emerging trend in cyber security, aimed at mining security data to uncover advanced targeted cyber threats actors and minimizing the operational overheads of maintaining static correlation rules. However, selection of optimal machine learning algorithm for security log analytics still remains an impeding factor against the success of data science in cyber security due to the risk of large number of false-positive detections, especially in the case of large-scale or global Security Operations Center (SOC) environments. This fact brings a dire need for an efficient machine learning based cyber threat detection model, capable of minimizing the false detection rates. In this paper, we are proposing optimal machine learning algorithms with their implementation framework based on analytical and empirical evaluations of gathered results, while using various prediction, classification and forecasting algorithms.
引用
收藏
页码:32 / 37
页数:6
相关论文
共 50 条
  • [21] Machine learning algorithms for event detection
    Margineantu, Dragos
    Wong, Weng-Keen
    Dash, Denver
    MACHINE LEARNING, 2010, 79 (03) : 257 - 259
  • [22] Guarding the Cloud: An Effective Detection of Cloud-Based Cyber Attacks using Machine Learning Algorithms
    Rexha, Blerim
    Thaqi, Rrezearta
    Mazrekaj, Artan
    Vishi, Kamer
    INTERNATIONAL JOURNAL OF ONLINE AND BIOMEDICAL ENGINEERING, 2023, 19 (18) : 158 - 174
  • [23] CyberSaver - A Machine Learning Approach to Detection of Cyber Bullying
    Jia, Hii Lee
    Hameed, Vazeerudeen Abdul
    School, Muhammad Ehsan Rana
    PROCEEDINGS OF THE 2022 16TH INTERNATIONAL CONFERENCE ON UBIQUITOUS INFORMATION MANAGEMENT AND COMMUNICATION (IMCOM 2022), 2022,
  • [24] Fall Detection in the Elderly using Different Machine Learning Algorithms with Optimal Window Size
    Kausar, Firdous
    Mesbah, Mostefa
    Iqbal, Waseem
    Ahmad, Awais
    Sayyed, Ikram
    MOBILE NETWORKS & APPLICATIONS, 2023, 29 (2): : 413 - 423
  • [25] Visualizing Interesting Patterns in Cyber Threat Intelligence Using Machine Learning Techniques
    Ejaz, Sarwat
    Noor, Umara
    Rashid, Zahid
    CYBERNETICS AND INFORMATION TECHNOLOGIES, 2022, 22 (02) : 96 - 113
  • [26] An Email Cyber Threat Intelligence Method Using Domain Ontology and Machine Learning
    Venckauskas, Algimantas
    Toldinas, Jevgenijus
    Morkevicius, Nerijus
    Sanfilippo, Filippo
    ELECTRONICS, 2024, 13 (14)
  • [27] Data Collection and Exploratory Analysis for Cyber Threat Intelligence Machine Learning Processes
    Wolf, Shaya
    Foster, Rita
    Mack, Andrea
    Priest, Zachary
    Haile, Jed
    2022 9TH SWISS CONFERENCE ON DATA SCIENCE (SDS), 2022, : 7 - 12
  • [28] RRIoT: Recurrent reinforcement learning for cyber threat detection on IoT devices
    Rookard, Curtis
    Khojandi, Anahita
    COMPUTERS & SECURITY, 2024, 140
  • [29] Insider Threat Detection Using Machine Learning Approach
    Sarhan, Bushra Bin
    Altwaijry, Najwa
    APPLIED SCIENCES-BASEL, 2023, 13 (01):
  • [30] Machine learning based Insider Threat Modelling and Detection
    Le, Duc C.
    Zincir-Heywood, A. Nur
    2019 IFIP/IEEE SYMPOSIUM ON INTEGRATED NETWORK AND SERVICE MANAGEMENT (IM), 2019,