User behaviour analysis using data analytics and machine learning to predict malicious user versus legitimate user

被引:7
|
作者
Ranjan, Rohit [1 ]
Kumar, Shashi Shekhar [2 ]
机构
[1] Thapar Univ, Thapar Inst Engn & Technol, Patiala, India
[2] Indian Inst Informat Technol Allahabad, Prayaraj, India
来源
HIGH-CONFIDENCE COMPUTING | 2022年 / 2卷 / 01期
关键词
Application security; Big data analytics; Machine learning; Random forest; Behavioral analysis; Prediction;
D O I
10.1016/j.hcc.2021.100034
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Research-based on user behavior analysis for authentication is the motivation for this research. We move ahead using a behavioral approach to identify malicious users and legitimate users. In this paper, we have explained how we have applied big data analytics to application-layer logs and predicted malicious users by employing a Machine Learning algorithm based on certain metrics explained later in the paper. Machine Learning would present a list of IP addresses or user identification tokens (UIT),deduced from live data which would be performing a malicious activity or are suspected of malicious activity based on their browsing behavior. We have created an e-commerce web application and induced vulnerabilities intentionally for this purpose. We have hosted our setup on LAMP [1] stack based on AWS cloud [2] . This method has a huge potential as any organization can imply this to monitor probable attackers thus narrowing down on their efforts to safeguard their infrastructure. The idea is based on the fact that the browsing pattern, as well as the access pattern of a genuine user,varies widely with that of a hacker. These patterns would be used to sort out the incoming traffic from and list out IP addresses and UIT that are the most probable cases of hack attempts.
引用
收藏
页数:10
相关论文
共 50 条
  • [1] Perceived User Reachability in Mobile UIs Using Data Analytics and Machine Learning
    Lee, Lik-Hang
    Yau, Yui-Pan
    Hui, Pan
    [J]. INTERNATIONAL JOURNAL OF HUMAN-COMPUTER INTERACTION, 2024,
  • [2] User group analytics: hypothesis generation and exploratory analysis of user data
    Omidvar-Tehrani, Behrooz
    Amer-Yahia, Sihem
    Borromeo, Ria Mae
    [J]. VLDB JOURNAL, 2019, 28 (02): : 243 - 266
  • [3] User group analytics: hypothesis generation and exploratory analysis of user data
    Behrooz Omidvar-Tehrani
    Sihem Amer-Yahia
    Ria Mae Borromeo
    [J]. The VLDB Journal, 2019, 28 : 243 - 266
  • [4] A New Approach to Predict user Mobility Using Semantic Analysis and Machine Learning
    Roshan Fernandes
    Rio D’Souza G. L.
    [J]. Journal of Medical Systems, 2017, 41
  • [5] A New Approach to Predict user Mobility Using Semantic Analysis and Machine Learning
    Fernandes, Roshan
    D'Souza, Rio G. L.
    [J]. JOURNAL OF MEDICAL SYSTEMS, 2017, 41 (12)
  • [6] Cyberattack Detection Framework Using Machine Learning and User Behavior Analytics
    Alshehri, Abdullah
    Khan, Nayeem
    Alowayr, Ali
    Alghamdi, Mohammed Yahya
    [J]. COMPUTER SYSTEMS SCIENCE AND ENGINEERING, 2023, 44 (02): : 1679 - 1689
  • [7] VASABI: Hierarchical User Profiles for Interactive Visual User Behaviour Analytics
    Nguyen, Phong H.
    Henkin, Rafael
    Chen, Siming
    Andrienko, Natalia
    Andrienko, Gennady
    Thonnard, Olivier
    Turkay, Cagatay
    [J]. IEEE TRANSACTIONS ON VISUALIZATION AND COMPUTER GRAPHICS, 2020, 26 (01) : 77 - 86
  • [8] Malicious Behaviour Analysis on Twitter Through the Lens of User Interest
    Alghamdi, Bandar
    Xu, Yue
    Watson, Jason
    [J]. DATA MINING, AUSDM 2017, 2018, 845 : 233 - 249
  • [9] Using Behavior Data to Predict User Success in Ontology Class Mapping - An Application of Machine Learning in Interaction Analysis
    Fu, Bo
    Steichen, Ben
    [J]. 2019 13TH IEEE INTERNATIONAL CONFERENCE ON SEMANTIC COMPUTING (ICSC), 2019, : 216 - 223
  • [10] BGP Dataset-Based Malicious User Activity Detection Using Machine Learning
    Park, Hansol
    Kim, Kookjin
    Shin, Dongil
    Shin, Dongkyoo
    [J]. INFORMATION, 2023, 14 (09)