Analytical Validation and Integration of CIC-Bell-DNS-EXF-2021 Dataset on Security Information and Event Management

被引:2
作者
Panigrahi, Gyana Ranjana [1 ]
Sethy, Prabira Kumar [1 ,2 ]
Behera, Santi Kumari [3 ]
Gupta, Manoj [4 ]
Alenizi, Farhan A. [5 ]
Suanpang, Pannee [6 ]
Nanthaamornphong, Aziz [7 ]
机构
[1] Sambalpur Univ, Dept Elect, Sambalpur, Orissa, India
[2] Guru Ghasidas Vishwavidyalaya, Dept Elect & Commun Engn, Bilaspur 495009, Chhattisgarh, India
[3] Veer Surendra Sai Univ Technol VSSUT, Dept Comp Sci & Engn, Burla 768018, Orissa, India
[4] Guru Ghasidas Vishwavidyalaya, Sch Studies Engn & Technol, Dept Elect Engn, Bilaspur 495009, Chhattisgarh, India
[5] Prince Sattam bin Abdulaziz Univ, Coll Engn, Dept Elect Engn, Al Kharj 11942, Saudi Arabia
[6] Suan Dusit Univ, Fac Sci & Technol, Dept Informat Technol, Bangkok 10700, Thailand
[7] Prince Songkla Univ, Coll Comp, Phuket 83120, Thailand
关键词
Security; Computer crime; Domain Name System; Servers; Computer hacking; Machine learning algorithms; MCDM; Computer security; Performance evaluation; Analytical models; Cyber security; SIEM; CIC-Bell-DNS-EXF-2021; HIDS; performance assessment; analytical validation; machine learning;
D O I
10.1109/ACCESS.2024.3409413
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Contemporary culture presents a substantial obstacle for cyber security experts in the shape of software vulnerabilities, which, if taken advantage of, can jeopardize the Confidentiality, Integrity, and Availability (CIA) of any system. Data-driven and modern threat intelligence tools can enhance cyber security, bolster resilience, and foster innovation across cloud, multi-cloud, and hybrid platforms. As a result, performance evaluation and accuracy verification have become essential for Security Information and Event Management (SIEM) to prevent cyber threats. The SIEM system offers threat intelligence, reporting, and security incident management through the collection and analysis of event logs and other data sources that are specific to events and their context. We propose a hybrid strategy to address threat intelligence, reporting, and security incident management consisting of two layers that utilize a predefined set of characteristics. Here, we use RStudio to assess how well a hybrid intrusion detection system (HIDS) handles the CIC-Bell-DNS-EXF-2021 dataset. Furthermore, we have incorporated our developed model into Multi-Criteria Decision Analysis Methods (MCDM) to enhance the methods' ability to identify complex DNS exfiltration attacks using machine learning algorithms: RF-AHP (RA), KNN-TOPSIS (KT), GBT-VIKOR (GV), and DT-Entropy-TOPSIS (DET). We consider several factors during the work, including accuracy, absolute error, weighted average recall, weighted average precision, kappa value, logistic loss, and root mean square deviation (RMSD). We use the Machine-Automated Model function to integrate and validate the models. According to the findings, GV has the highest level of accuracy, with a rate of 99.52%, while KT has the lowest level of authenticity, with a rate of 93.65%. Furthermore, these findings illustrate enhanced performance metrics for multiclass classification in comparison to previous approaches.
引用
收藏
页码:83043 / 83056
页数:14
相关论文
共 29 条
[1]  
Ahmad Khan M., 2023, Malaysian J. Comput. Sci., V36, P347
[2]   A new intelligent multilayer framework for insider threat detection [J].
Al-Mhiqani, Mohammed Nasser ;
Ahmad, Rabiah ;
Abidin, Z. Zainal ;
Abdulkareem, Karrar Hameed ;
Mohammed, Mazin Abed ;
Gupta, Deepak ;
Shankar, K. .
COMPUTERS & ELECTRICAL ENGINEERING, 2022, 97
[3]   Optimal Machine Learning Based Privacy Preserving Blockchain Assisted Internet of Things with Smart Cities Environment [J].
Al-Qarafi, A. ;
Alrowais, Fadwa ;
Alotaibi, S. Saud ;
Nemri, Nadhem ;
Al-Wesabi, Fahd N. ;
Al Duhayyim, Mesfer ;
Marzouk, Radwa ;
Othman, Mahmoud ;
Al-Shabi, M. .
APPLIED SCIENCES-BASEL, 2022, 12 (12)
[4]   DoS and DDoS mitigation using Variational Autoencoders [J].
Barli, Eirik Molde ;
Yazidi, Anis ;
Viedma, Enrique Herrera ;
Haugerud, Harek .
COMPUTER NETWORKS, 2021, 199
[5]  
Chayal N. M., 2022, Ann. Data Sci., V1, P1
[6]   A real-time hostile activities analyses and detection system [J].
Dadkhah, Sajjad ;
Shoeleh, Farzaneh ;
Yadollahi, Mohammad Mehdi ;
Zhang, Xichen ;
Ghorbani, Ali A. .
APPLIED SOFT COMPUTING, 2021, 104
[7]   A Software Defined Network information security risk assessment based on Pythagorean fuzzy sets [J].
Deb, Raktim ;
Roy, Sudipta .
EXPERT SYSTEMS WITH APPLICATIONS, 2021, 183
[8]   Supervised feature selection techniques in network intrusion detection: A critical review [J].
Di Mauro, M. ;
Galatro, G. ;
Fortino, G. ;
Liotta, A. .
ENGINEERING APPLICATIONS OF ARTIFICIAL INTELLIGENCE, 2021, 101
[9]   Performance analysis of machine learning models for intrusion detection system using Gini Impurity-based Weighted Random Forest (GIWRF) feature selection technique [J].
Disha, Raisa Abedin ;
Waheed, Sajjad .
CYBERSECURITY, 2022, 5 (01)
[10]   Crafting performance-based cryptocurrency mining strategies using a hybrid analytics approach [J].
Hacioglu, Umit ;
Chlyeh, Dounia ;
Yilmaz, Mustafa K. ;
Tatoglu, Ekrem ;
Delen, Dursun .
DECISION SUPPORT SYSTEMS, 2021, 142