Deep Belief Network-Based User and Entity Behavior Analytics (UEBA) for Web Applications

被引:2
作者
Deepa, S. [1 ]
Umamageswari, A. [1 ]
Neelakandan, S. [2 ]
Bhukya, Hanumanthu [3 ]
Haritha, I. V. Sai Lakshmi [4 ]
Shanbhog, Manjula [5 ]
机构
[1] SRM Inst Sci & Technol, Dept Comp Sci & Engn, Ramapuram Campus, Chennai, Tamil Nadu, India
[2] RMK Engn Coll, Dept Comp Sci & Engn, Chennai, Tamil Nadu, India
[3] Kakatiya Inst Technol & Sci, Dept Comp Sci & Engn Networks, Warangal, Telangana, India
[4] MLR Inst Technol, Dept Informat Technol, Hyderabad, Telangana, India
[5] CHRIST Deemed Univ, Dept Sci, Ghaziabad 201003, Uttar Pradesh, India
关键词
Anomaly detection; federated identity management; deep belief network (dbn); user and entity behavior analytics;
D O I
10.1142/S0218843023500168
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Machine learning (ML) is currently a crucial tool in the field of cyber security. Through the identification of patterns, the mapping of cybercrime in real time, and the execution of in-depth penetration tests, ML is able to counter cyber threats and strengthen security infrastructure. Security in any organization depends on monitoring and analyzing user actions and behaviors. Due to the fact that it frequently avoids security precautions and does not trigger any alerts or flags, it is much more challenging to detect than traditional malicious network activity. ML is an important and rapidly developing anomaly detection field in order to protect user security and privacy, a wide range of applications, including various social media platforms, have incorporated cutting-edge techniques to detect anomalies. A social network is a platform where various social groups can interact, express themselves, and share pertinent content. By spreading propaganda, unwelcome messages, false information, fake news, and rumours, as well as by posting harmful links, this social network also encourages deviant behavior. In this research, we introduce Deep Belief Network (DBN) with Triple DES, a hybrid approach to anomaly detection in unbalanced classification. The results show that the DBN-TDES model can typically detect anomalous user behaviors that other models in anomaly detection cannot.
引用
收藏
页数:28
相关论文
共 27 条
[11]   A Survey: Machine Learning Based Security Analytics Approaches and Applications of Blockchain in Network Security [J].
Chen, Lin ;
Lv, Huahui ;
Fan, Kai ;
Yang, Hang ;
Kuang, Xiaoyun ;
Xu, Aidong ;
Yang, Yiwei .
2020 3RD INTERNATIONAL CONFERENCE ON SMART BLOCKCHAIN (SMARTBLOCK), 2020, :17-22
[12]   An Intelligent Deep Feature Based Intrusion Detection System for Network Applications [J].
Shailaja, K. ;
Srinivasulu, B. ;
Thirupathi, Lingala ;
Gangula, Rekha ;
Boya, Thejoramnaresh Reddy ;
Polem, Vemulamma .
WIRELESS PERSONAL COMMUNICATIONS, 2023, 129 (01) :345-370
[13]   A hybrid behavior- and Bayesian network-based framework for cyber-physical anomaly detection [J].
Faramondi, Luca ;
Flammini, Francesco ;
Guarino, Simone ;
Setola, Roberto .
COMPUTERS & ELECTRICAL ENGINEERING, 2023, 112
[14]   Deep Neural Network-based Relationship Identification Framework to Discriminate Fake Profile Over Social Media [J].
Joshi, Suneet ;
Tomar, Deepak Singh .
INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2021, 12 (03) :599-611
[15]   A survey for user behavior analysis based on machine learning techniques: current models and applications [J].
Martin, Alejandro G. ;
Fernandez-Isabel, Alberto ;
de Diego, Isaac Martin ;
Beltran, Marta .
APPLIED INTELLIGENCE, 2021, 51 (08) :6029-6055
[16]   UI-GAN: Generative Adversarial Network-Based Anomaly Detection Using User Initial Information for Wearable Devices [J].
Nho, Young-Hoon ;
Ryu, Semin ;
Kwon, Dong-Soo .
IEEE SENSORS JOURNAL, 2021, 21 (08) :9949-9958
[17]   Deep convolutional neural network-based anomaly detection for organ classification in gastric X-ray examination [J].
Togo, Ren ;
Watanabe, Haruna ;
Ogawa, Takahiro ;
Haseyama, Miki .
COMPUTERS IN BIOLOGY AND MEDICINE, 2020, 123
[18]   A deep graph neural network-based link prediction model for proactive anomaly detection in discrete manufacturing workshop [J].
Wang, Shengbo ;
Guo, Yu ;
Huang, Shaohua ;
Lai, Ruixi ;
Zhang, Litong ;
Qian, Weiwei .
JOURNAL OF MANUFACTURING SYSTEMS, 2025, 79 :301-317
[19]   Adam-Dingo optimized deep maxout network-based video surveillance system for stealing crime detection [J].
Waddenkery N. ;
Soma S. .
Measurement: Sensors, 2023, 29
[20]   Research on the application of network security defence in database security services based on deep learning integrated with big data analytics [J].
Hang F. ;
Xie L. ;
Zhang Z. ;
Guo W. ;
Li H. .
International Journal of Intelligent Networks, 2024, 5 :101-109