• Complex
  • Title
  • Keyword
  • Abstract
  • Scholars
  • Journal
  • ISSN
  • Conference
搜索

Author:

Qureshi, S.S. (Qureshi, S.S..) | He, J. (He, J..) | Qureshi, S.U. (Qureshi, S.U..) | Zhu, N. (Zhu, N..) | Wajahat, A. (Wajahat, A..) | Nazir, A. (Nazir, A..) | Shafi, H. (Shafi, H..)

Indexed by:

EI Scopus

Abstract:

Evidence shows that computer system users, small companies, and multinational corporations require Network Forensics Analysis to prevent attacks that may compromise their data. To this purpose, logs automatically generated by computer systems can be analyzed to identify, control, and properly fight different attacks. However, large amounts of data make it difficult to accurately analyze certain behaviors that may be considered risky to computer systems. This paper focuses on developing and training a Machine Learning (ML) Decision Tree Model to predict potential malicious attacks originated from specific networks. The KDD Cup dataset, which includes a wide variety of network intrusions simulated in a military network environment, was used. Dataset was analyzed and subsequently used to train, test, correct, and adjust the proposed model. The used dataset also showed a high risk at the connection ends. The proposed model was coded in Python to detect malicious connections and successfully achieve 99% accuracy. The subsequent development of a variant model using Principal Component Analysis showed its effectiveness and robustness by reducing its complexity. This paper also offers the possibility of developing tools to detect attacks and potential threats to security systems automatically, thus suggesting computer administrators use Network Forensics Analysis, data mining, and machine learning to provide security to their computer system. © 2024 IEEE.

Keyword:

Computer Security Machine Learning Network Forensics Analysis Data Mining Malicious Attacks

Author Community:

  • [ 1 ] [Qureshi S.S.]Beijing University of Technology Beijing, Faculty of Information Technology, Beijing, China
  • [ 2 ] [He J.]Beijing University of Technology Beijing, Faculty of Information Technology, Beijing, China
  • [ 3 ] [Qureshi S.U.]Beijing University of Technology Beijing, Faculty of Information Technology, Beijing, China
  • [ 4 ] [Zhu N.]Beijing University of Technology Beijing, Faculty of Information Technology, Beijing, China
  • [ 5 ] [Wajahat A.]Beijing University of Technology Beijing, Faculty of Information Technology, Beijing, China
  • [ 6 ] [Nazir A.]Beijing University of Technology Beijing, Faculty of Information Technology, Beijing, China
  • [ 7 ] [Shafi H.]Sindh Agriculture University, Information Technology Centre, Tandojam, Pakistan

Reprint Author's Address:

Email:

Show more details

Related Keywords:

Related Article:

Source :

Year: 2024

Language: English

Cited Count:

WoS CC Cited Count:

SCOPUS Cited Count:

ESI Highly Cited Papers on the List: 0 Unfold All

WanFang Cited Count:

Chinese Cited Count:

30 Days PV: 4

Affiliated Colleges:

Online/Total:417/10592391
Address:BJUT Library(100 Pingleyuan,Chaoyang District,Beijing 100124, China Post Code:100124) Contact Us:010-67392185
Copyright:BJUT Library Technical Support:Beijing Aegean Software Co., Ltd.