Enhancing Cybersecurity through Machine Learning-driven Anomaly Detection Systems

Authors

  • Dr Emily Chen Professor, University of Queensland, Gatton Campus, Gatton, QLD, Australia Author
  • Prof. Chien-Ming Professor, University of Queensland, Gatton Campus, Gatton, QLD, Australia Author
  • Dr Steve Lockey Professor, University of Queensland, Gatton Campus, Gatton, QLD, Australia Author
  • Dr Hassan Khosravi Professor, University of Queensland, Gatton Campus, Gatton, QLD, Australia Author
  • Dr Nell Baghaei Professor, University of Queensland, Gatton Campus, Gatton, QLD, Australia Author

Keywords:

Cybersecurity, Machine Learning-driven Anomaly Detection Systems

Abstract

Detecting anomalies inherent in a dataset is a critical task in many areas. Since anomalies can be attributed to defects in systems and examples of 0day attacks, discovering abnormal samples has become an important issue in a burgeoning number of domains. Although many ML algorithms produce satisfactory performance levels when labeling normal and abnormal samples is simple, if designing such a label is difficult, these models require numerous labeled samples to accomplish an accurate normal-abnormal characterization of the features inherent in a data collection.

In this work, cybersecurity is enhanced by automating the design of Machine Learning (ML) anomaly detection systems to protect the systems from never-before-seen (0day) attacks. There are two strategies that this project follows to accomplish this objective. Firstly, new strategies for expanding the usage of labels to provide more information for the designed anomaly detection system are developed by creating an innovative representation of the features. Secondly, Multiple Instance Learning (MIL) is extended to a more generalized setting called Transformation-based Multiple Instance Learning (TMMIL) for designing ML algorithms to perform well with more training data.

Cybersecurity deals with protecting systems connected to the web from attacks by hackers or terrorists. However, most existing cybersecurity techniques make use of signatures for detecting attacks. If a hacker crafts a new strike, after the hacker performs the strike, the trend of the strike is studied and signatures are then available to the general public so that the strike can be detected in the future.

Downloads

Download data is not yet available.

References

Pulimamidi, Rahul. "To enhance customer (or patient) experience based on IoT analytical study through technology (IT) transformation for E-healthcare." Measurement: Sensors (2024): 101087.

Pargaonkar, Shravan. "The Crucial Role of Inspection in Software Quality Assurance." Journal of Science & Technology 2.1 (2021): 70-77.

Menaga, D., Loknath Sai Ambati, and Giridhar Reddy Bojja. "Optimal trained long short-term memory for opinion mining: a hybrid semantic knowledgebase approach." International Journal of Intelligent Robotics and Applications 7.1 (2023): 119-133.

Singh, Amarjeet, and Alok Aggarwal. "Securing Microservices using OKTA in Cloud Environment: Implementation Strategies and Best Practices." Journal of Science & Technology 4.1 (2023): 11-39.

Singh, Vinay, et al. "Improving Business Deliveries for Micro-services-based Systems using CI/CD and Jenkins." Journal of Mines, Metals & Fuels 71.4 (2023).

Reddy, Surendranadha Reddy Byrapu. "Big Data Analytics-Unleashing Insights through Advanced AI Techniques." Journal of Artificial Intelligence Research and Applications 1.1 (2021): 1-10.

Raparthi, Mohan, et al. "Data Science in Healthcare Leveraging AI for Predictive Analytics and Personalized Patient Care." Journal of AI in Healthcare and Medicine 2.2 (2022): 1-11.

Downloads

Published

2024-04-18

How to Cite

[1]
Dr Emily Chen, Prof. Chien-Ming, Dr Steve Lockey, Dr Hassan Khosravi, and Dr Nell Baghaei, “Enhancing Cybersecurity through Machine Learning-driven Anomaly Detection Systems”, J. of Artificial Int. Research and App., vol. 4, no. 1, pp. 123–135, Apr. 2024, Accessed: Jul. 01, 2024. [Online]. Available: https://aimlstudies.co.uk/index.php/jaira/article/view/22

Similar Articles

1-10 of 76

You may also start an advanced similarity search for this article.