Advanced Machine Learning Techniques for Detecting Behavior-Based Intranet Threats
Keywords:
Machine Learning, Intrusion Detection, Behavior-based Attacks, Network Security, Cyber SecurityAbstract
Detection of attacks occurring within an Intranet using a behaviour-based machine learning approach. The detection of intranet intrusions is made difficult by the new and emerging malicious behaviours and attacks on system internets. Hence, the concept behind the proposed network-stage approach is the combination of machine learning techniques with behaviour-based detection techniques. This would require exploiting machine learning algorithms to seek application in identifying intranet attacks based on user behavioural patterns, to be analysed alongside a given network-based traffic and the concerned system logs. The model thus learns to discriminate normal from anomalous behaviours, thus ensuring proactive response mechanisms for threat detection. The approach thus defined could offer a very feasible pathway to extending the detection features and adaptive defense mechanism for intranets concerning the security posture of such environments to real-time detection. The experimental evaluations and comparison analyses prove its effectiveness and indicate that it could be easily integrated into the extant security framework to enhance the internetworks against new threats. The proposed system also includes feature engineering methods for retrieval of important patterns in terms of behaviour from network and system data. Thus, it will do more efficiency in anomaly detection. The model learns continuously from the evolving behaviours in the network and adapts to new and unknown attack strategies. It helps keep the dynamic approach based and allows the system to focus on broad intranet threats, making it highly suitable for modern cyber infrastructures toward which security focuses.
Downloads
References
Bhardwaj, A., Al-Turjman, F., Kumar, M., Stephan, T., & Mostarda, L. (2020). Capturing-the-Invisible (CTI): Behavior-Based Attacks Recognition in IoT-Oriented Industrial Control Systems. IEEE Access, 8, 104956–104966. https://doi.org/10.1109/ACCESS.2020.2998983
Chen, T., Zhang, H., Liu, T., & Li, R. (2022). Research on Cyber Attack Modeling and Attack Path Discovery. Proceedings - 2022 2nd International Conference on Computational Modeling, Simulation and Data Analysis, CMSDA 2022, 332–338. https://doi.org/10.1109/CMSDA58069.2022.00068
Coates, G. M., Hopkinson, K. M., Graham, S. R., & Kurkowski, S. H. (2008). Collaborative, trust-based security mechanisms for a regional utility intranet. IEEE Transactions on Power Systems, 23(3), 831–844. https://doi.org/10.1109/TPWRS.2008.926456
Fu, X., & Sun, Y. (2024). A Combined Intrusion Strategy Based on Apollonius Circle for Multiple Mobile Robots in Attack-Defense Scenario. IEEE Robotics and Automation Letters. https://doi.org/10.1109/LRA.2024.3512361
Hsu, F. H., Tso, C. K., Yeh, Y. C., Wang, W. J., & Chen, L. H. (2011). BrowserGuard: A behavior-based solution to drive-by-download attacks. IEEE Journal on Selected Areas in Communications, 29(7), 1461–1468. https://doi.org/10.1109/JSAC.2011.110811
Jang, M., & Lee, K. (2024a). An Advanced Approach for Detecting Behavior-Based Intranet Attacks by Machine Learning. IEEE Access, 12, 52480–52495. https://doi.org/10.1109/ACCESS.2024.3387016
Jang, M., & Lee, K. (2024b). An Advanced Approach for Detecting Behavior-Based Intranet Attacks by Machine Learning. IEEE Access, 12, 52480–52495. https://doi.org/10.1109/ACCESS.2024.3387016
Lewis, J. R. (2013). Critical review of “the intranet satisfaction questionnaire: Development and validation of a questionnaire to measure user satisfaction with the intranet.” Interacting with Computers, 25(4), 299–301. https://doi.org/10.1093/IWC/IWT011
Li, J., Zhao, Z., Li, R., & Zhang, H. (2019). AI-based two-stage intrusion detection for software defined IoT networks. IEEE Internet of Things Journal, 6(2), 2093–2102. https://doi.org/10.1109/JIOT.2018.2883344
Liu, C., Cui, X., Wang, Z., Wang, X., Feng, Y., & Li, X. (2018). MaliceScript: A novel browser-based intranet threat. Proceedings - 2018 IEEE 3rd International Conference on Data Science in Cyberspace, DSC 2018, 219–226. https://doi.org/10.1109/DSC.2018.00039
Malamateniou, F., Vassilacopoulos, G., & Tsanakas, P. (1998). A workflow-based approach to virtual patient record security. IEEE Transactions on Information Technology in Biomedicine, 2(3), 139–145. https://doi.org/10.1109/4233.735778
Mohammadi, F., Bok, R., & Saif, M. (2023). A Proactive Intrusion Detection and Mitigation System for Grid-Connected Photovoltaic Inverters. IEEE Transactions on Industrial Cyber-Physical Systems, 1, 273–286. https://doi.org/10.1109/TICPS.2023.3326773
Simsek, S. (2006a). Work in progress - Tracking correlated attacks in enterprise intranets through Lattices. 2006 Securecomm and Workshops. https://doi.org/10.1109/SECCOMW.2006.359570
Simsek, S. (2006b). Work in progress - Tracking correlated attacks in enterprise intranets through Lattices. 2006 Securecomm and Workshops. https://doi.org/10.1109/SECCOMW.2006.359570
Skopik, F., Wurzenberger, M., Hold, G., Landauer, M., & Kuhn, W. (2023). Behavior-Based Anomaly Detection in Log Data of Physical Access Control Systems. IEEE Transactions on Dependable and Secure Computing, 20(4), 3158–3175. https://doi.org/10.1109/TDSC.2022.3197265
Sun, M., Li, X., Lui, J. C. S., Ma, R. T. B., & Liang, Z. (2017). Monet: A User-Oriented Behavior-Based Malware Variants Detection System for Android. IEEE Transactions on Information Forensics and Security, 12(5), 1103–1112. https://doi.org/10.1109/TIFS.2016.2646641
Tsai, S. M., Wu, S. S., Sun, S. S., & Yang, P. C. (2000). Integrated home service network on intelligent Intranet. IEEE Transactions on Consumer Electronics, 46(3), 499–504. https://doi.org/10.1109/30.883401
Wei, S., Jia, Y., Gu, Z., Shafiq, M., & Wang, L. (2023). Extracting Novel Attack Strategies for Industrial Cyber-Physical Systems Based on Cyber Range. IEEE Systems Journal, 17(4), 5292–5302. https://doi.org/10.1109/JSYST.2023.3303361
Williamson, J. (1998). Review: Intranet Security. The Computer Bulletin, 40(3), 32–32. https://doi.org/10.1093/COMBUL/40.3.32-B
Zeng, W., Lu, P., Wang, H., & Lou, F. (2023). Enterprise Intranet Threat Intelligence Processing Framework Based on Open Source Community. ITOEC 2023 - IEEE 7th Information Technology and Mechatronics Engineering Conference, 2061–2066. https://doi.org/10.1109/ITOEC57671.2023.10291523
Downloads
Published
Issue
Section
License
Copyright (c) 2025 International Journal of Scientific Research in Computer Science, Engineering and Information Technology

This work is licensed under a Creative Commons Attribution 4.0 International License.