A Novel Approach for Cyber Threat Detection Based on Angle-Based Subspace Anomaly Detection

被引:1
作者
Soumya, T. R. [1 ]
Revathy, S. [1 ]
机构
[1] Sathyabama Univ, Dept Comp Sci & Engn, Chennai, India
关键词
Anomaly; big data; cyber threat; dimensionality; social media;
D O I
10.1080/01969722.2022.2148509
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
In real time applications related to social media, conventional anomaly detection techniques are not applicable as the accuracy is degraded due to higher dimensionality thereby hampering these applications leading to cyber threat. This paper focuses on an approach that can select feature subspaces of social media which have meaningful information and thereby conduct anomaly detection in the projected subspace correspondingly. Major goal is to maintain the accuracy of detection in the circumstance of high dimensionality detecting cyber threat. This approach determines the angle between any of the two lines for one of the anomaly candidate specifically where the first line is in connection with relevant data points along with centers of adjacent points and the other line is any parallel axis line. For a particular candidate in social media, any dimension having smallest angle with the first line is chosen as subspace parallel to the axis. In the projected subspace, the local outlierness is measured for an object by introducing normalized values of Mahalanobis distance. Artificial datasets are constructed for comparing proposed approach of detecting cyber threats in social media comprehensively and found to be accurate.
引用
收藏
页数:10
相关论文
共 24 条
[1]  
ALURKAR A.A., 2019, Applied Machine Learning for Smart Data Analysis, P185
[2]  
[Anonymous], 2006, 5 WORKSH EC INF SEC
[3]  
Azlin A., 2018, JURNAL INFORMATIKA, V7, P1
[4]   Machine learning for email spam filtering: review, approaches and open research problems [J].
Dada, Emmanuel Gbenga ;
Bassi, Joseph Stephen ;
Chiroma, Haruna ;
Abdulhamid, Shafi'i Muhammad ;
Adetunmbi, Adebayo Olusola ;
Ajibuwa, Opeyemi Emmanuel .
HELIYON, 2019, 5 (06)
[5]   A machine learning based intrusion detection scheme for data fusion in mobile clouds involving heterogeneous client networks [J].
Dey, Saurabh ;
Ye, Qiang ;
Sampalli, Srinivas .
INFORMATION FUSION, 2019, 49 :205-215
[6]   The Future of Cybersecurity: Major Role of Artificial Intelligence, Machine Learning, and Deep Learning in Cyberspace [J].
Geluvaraj, B. ;
Satwik, P. M. ;
Kumar, T. A. Ashok .
INTERNATIONAL CONFERENCE ON COMPUTER NETWORKS AND COMMUNICATION TECHNOLOGIES (ICCNCT 2018), 2019, 15 :739-747
[7]  
Go Alec., 2009, CS224N project report 1.12
[8]   Social Sentiment Sensor in Twitter for Predicting Cyber-Attacks Using l1 Regularization [J].
Hernandez-Suarez, Aldo ;
Sanchez-Perez, Gabriel ;
Toscano-Medina, Karina ;
Martinez-Hernandez, Victor ;
Perez-Meana, Hector ;
Olivares-Mercado, Jesus ;
Sanchez, Victor .
SENSORS, 2018, 18 (05)
[9]  
Iyer SS., 2020, HDB RES MACHINE DEEP, P64
[10]   Predicting Spam Messages Using Back Propagation Neural Network [J].
Jain, Ankit Kumar ;
Goel, Diksha ;
Agarwal, Sanjli ;
Singh, Yukta ;
Bajaj, Gaurav .
WIRELESS PERSONAL COMMUNICATIONS, 2020, 110 (01) :403-422