Advanced Machine Learning Techniques for Detecting Behavior-Based Intranet Threats

Authors

  • Konapalli Kalyani M. Tech Student, PVKK Institute of Technology, Andhra Pradesh, India Author
  • M. Dharani Kumar Assistant professor, PVKK Institute of Technology, Andhra Pradesh, India Author
  • B Rajesh Kumar Assistant professor, PVKK Institute of Technology, Andhra Pradesh, India Author

Keywords:

Machine Learning, Intrusion Detection, Behavior-based Attacks, Network Security, Cyber Security

Abstract

Detection of attacks occurring within an Intranet using a behaviour-based machine learning approach. The detection of intranet intrusions is made difficult by the new and emerging malicious behaviours and attacks on system internets. Hence, the concept behind the proposed network-stage approach is the combination of machine learning techniques with behaviour-based detection techniques. This would require exploiting machine learning algorithms to seek application in identifying intranet attacks based on user behavioural patterns, to be analysed alongside a given network-based traffic and the concerned system logs. The model thus learns to discriminate normal from anomalous behaviours, thus ensuring proactive response mechanisms for threat detection. The approach thus defined could offer a very feasible pathway to extending the detection features and adaptive defense mechanism for intranets concerning the security posture of such environments to real-time detection. The experimental evaluations and comparison analyses prove its effectiveness and indicate that it could be easily integrated into the extant security framework to enhance the internetworks against new threats. The proposed system also includes feature engineering methods for retrieval of important patterns in terms of behaviour from network and system data. Thus, it will do more efficiency in anomaly detection. The model learns continuously from the evolving behaviours in the network and adapts to new and unknown attack strategies. It helps keep the dynamic approach based and allows the system to focus on broad intranet threats, making it highly suitable for modern cyber infrastructures toward which security focuses.

Downloads

Download data is not yet available.

References

Bhardwaj, A., Al-Turjman, F., Kumar, M., Stephan, T., & Mostarda, L. (2020). Capturing-the-Invisible (CTI): Behavior-Based Attacks Recognition in IoT-Oriented Industrial Control Systems. IEEE Access, 8, 104956–104966. https://doi.org/10.1109/ACCESS.2020.2998983

Chen, T., Zhang, H., Liu, T., & Li, R. (2022). Research on Cyber Attack Modeling and Attack Path Discovery. Proceedings - 2022 2nd International Conference on Computational Modeling, Simulation and Data Analysis, CMSDA 2022, 332–338. https://doi.org/10.1109/CMSDA58069.2022.00068

Coates, G. M., Hopkinson, K. M., Graham, S. R., & Kurkowski, S. H. (2008). Collaborative, trust-based security mechanisms for a regional utility intranet. IEEE Transactions on Power Systems, 23(3), 831–844. https://doi.org/10.1109/TPWRS.2008.926456

Fu, X., & Sun, Y. (2024). A Combined Intrusion Strategy Based on Apollonius Circle for Multiple Mobile Robots in Attack-Defense Scenario. IEEE Robotics and Automation Letters. https://doi.org/10.1109/LRA.2024.3512361

Hsu, F. H., Tso, C. K., Yeh, Y. C., Wang, W. J., & Chen, L. H. (2011). BrowserGuard: A behavior-based solution to drive-by-download attacks. IEEE Journal on Selected Areas in Communications, 29(7), 1461–1468. https://doi.org/10.1109/JSAC.2011.110811

Jang, M., & Lee, K. (2024a). An Advanced Approach for Detecting Behavior-Based Intranet Attacks by Machine Learning. IEEE Access, 12, 52480–52495. https://doi.org/10.1109/ACCESS.2024.3387016

Jang, M., & Lee, K. (2024b). An Advanced Approach for Detecting Behavior-Based Intranet Attacks by Machine Learning. IEEE Access, 12, 52480–52495. https://doi.org/10.1109/ACCESS.2024.3387016

Lewis, J. R. (2013). Critical review of “the intranet satisfaction questionnaire: Development and validation of a questionnaire to measure user satisfaction with the intranet.” Interacting with Computers, 25(4), 299–301. https://doi.org/10.1093/IWC/IWT011

Li, J., Zhao, Z., Li, R., & Zhang, H. (2019). AI-based two-stage intrusion detection for software defined IoT networks. IEEE Internet of Things Journal, 6(2), 2093–2102. https://doi.org/10.1109/JIOT.2018.2883344

Liu, C., Cui, X., Wang, Z., Wang, X., Feng, Y., & Li, X. (2018). MaliceScript: A novel browser-based intranet threat. Proceedings - 2018 IEEE 3rd International Conference on Data Science in Cyberspace, DSC 2018, 219–226. https://doi.org/10.1109/DSC.2018.00039

Malamateniou, F., Vassilacopoulos, G., & Tsanakas, P. (1998). A workflow-based approach to virtual patient record security. IEEE Transactions on Information Technology in Biomedicine, 2(3), 139–145. https://doi.org/10.1109/4233.735778

Mohammadi, F., Bok, R., & Saif, M. (2023). A Proactive Intrusion Detection and Mitigation System for Grid-Connected Photovoltaic Inverters. IEEE Transactions on Industrial Cyber-Physical Systems, 1, 273–286. https://doi.org/10.1109/TICPS.2023.3326773

Simsek, S. (2006a). Work in progress - Tracking correlated attacks in enterprise intranets through Lattices. 2006 Securecomm and Workshops. https://doi.org/10.1109/SECCOMW.2006.359570

Simsek, S. (2006b). Work in progress - Tracking correlated attacks in enterprise intranets through Lattices. 2006 Securecomm and Workshops. https://doi.org/10.1109/SECCOMW.2006.359570

Skopik, F., Wurzenberger, M., Hold, G., Landauer, M., & Kuhn, W. (2023). Behavior-Based Anomaly Detection in Log Data of Physical Access Control Systems. IEEE Transactions on Dependable and Secure Computing, 20(4), 3158–3175. https://doi.org/10.1109/TDSC.2022.3197265

Sun, M., Li, X., Lui, J. C. S., Ma, R. T. B., & Liang, Z. (2017). Monet: A User-Oriented Behavior-Based Malware Variants Detection System for Android. IEEE Transactions on Information Forensics and Security, 12(5), 1103–1112. https://doi.org/10.1109/TIFS.2016.2646641

Tsai, S. M., Wu, S. S., Sun, S. S., & Yang, P. C. (2000). Integrated home service network on intelligent Intranet. IEEE Transactions on Consumer Electronics, 46(3), 499–504. https://doi.org/10.1109/30.883401

Wei, S., Jia, Y., Gu, Z., Shafiq, M., & Wang, L. (2023). Extracting Novel Attack Strategies for Industrial Cyber-Physical Systems Based on Cyber Range. IEEE Systems Journal, 17(4), 5292–5302. https://doi.org/10.1109/JSYST.2023.3303361

Williamson, J. (1998). Review: Intranet Security. The Computer Bulletin, 40(3), 32–32. https://doi.org/10.1093/COMBUL/40.3.32-B

Zeng, W., Lu, P., Wang, H., & Lou, F. (2023). Enterprise Intranet Threat Intelligence Processing Framework Based on Open Source Community. ITOEC 2023 - IEEE 7th Information Technology and Mechatronics Engineering Conference, 2061–2066. https://doi.org/10.1109/ITOEC57671.2023.10291523

Downloads

Published

23-03-2025

Issue

Section

Research Articles