Methods to Collect and Assess Data for Recognizing, Halting, and Mitigating Cyber Threats
Publish Year: 1403
نوع سند: مقاله کنفرانسی
زبان: English
View: 166
This Paper With 10 Page And PDF Format Ready To Download
- Certificate
- من نویسنده این مقاله هستم
استخراج به نرم افزارهای پژوهشی:
شناسه ملی سند علمی:
INDEXCONF05_009
تاریخ نمایه سازی: 17 فروردین 1404
Abstract:
This research looks at sophisticated cyber threat intelligence (CTI) techniques, with an emphasis on how to gather, process, and use data to identify, stop, and mitigating cyber threats. We assess and contrast various data mining and machine learning techniques, such as supervised and unsupervised learning models, for threat analysis and detection. The efficiency of ensemble approaches that combine deep learning and conventional anomaly detection techniques is demonstrated by experimental results on real-world cyber threat datasets. The suggested hybrid model outperforms individual models with an accuracy of ۹۶.۳% in detecting threats. As a result of the CTI system's implementation, there were ۴۲% fewer successful attacks and ۳۵% fewer threats detected in the interim. Future research directions and the main obstacles and constraints in operationalizing CTI are examined.
Keywords:
Authors
Seyyed Mohammad Ali Abolmaali
MSc, Computer Engineering Department, Bu-Ali Sina University, Hamedan, Iran
Reza Mohammadi
Assistant Professor, Computer Engineering Department, Bu-Ali Sina University, Hamedan, Iran
Mohammad Nassiri
Associate Professor, Computer Engineering Department, Bu-Ali Sina University, Hamedan, Iran