Methods to Collect and Assess Data for Recognizing, Halting, and Mitigating Cyber Threats

Publish Year: 1403
نوع سند: مقاله کنفرانسی
زبان: English
View: 166

This Paper With 10 Page And PDF Format Ready To Download

  • Certificate
  • من نویسنده این مقاله هستم

استخراج به نرم افزارهای پژوهشی:

لینک ثابت به این Paper:

شناسه ملی سند علمی:

INDEXCONF05_009

تاریخ نمایه سازی: 17 فروردین 1404

Abstract:

This research looks at sophisticated cyber threat intelligence (CTI) techniques, with an emphasis on how to gather, process, and use data to identify, stop, and mitigating cyber threats. We assess and contrast various data mining and machine learning techniques, such as supervised and unsupervised learning models, for threat analysis and detection. The efficiency of ensemble approaches that combine deep learning and conventional anomaly detection techniques is demonstrated by experimental results on real-world cyber threat datasets. The suggested hybrid model outperforms individual models with an accuracy of ۹۶.۳% in detecting threats. As a result of the CTI system's implementation, there were ۴۲% fewer successful attacks and ۳۵% fewer threats detected in the interim. Future research directions and the main obstacles and constraints in operationalizing CTI are examined.

Keywords:

Cyber threat intelligence techniques , Machine learning , Deep learning , Mitigate

Authors

Seyyed Mohammad Ali Abolmaali

MSc, Computer Engineering Department, Bu-Ali Sina University, Hamedan, Iran

Reza Mohammadi

Assistant Professor, Computer Engineering Department, Bu-Ali Sina University, Hamedan, Iran

Mohammad Nassiri

Associate Professor, Computer Engineering Department, Bu-Ali Sina University, Hamedan, Iran