Machine Automation Making Cyber-Policy Violator More Resilient: A Proportionate Study

Machine Automation Making Cyber-Policy Violator More Resilient: A Proportionate Study

Gyana Ranjana Panigrahi, Nalini Kanta Barpanda, Madhumita Panda
DOI: 10.4018/978-1-7998-6659-6.ch018
OnDemand:
(Individual Chapters)
Available
$37.50
No Current Special Offers
TOTAL SAVINGS: $37.50

Abstract

Cybersecurity is of global importance. Nearly all association suffer from an active cyber-attack. However, there is a lack of making cyber policy violator more resilient for analysts in proportionately analyzing security incidents. Now the question: Is there any proper technique of implementations for assisting automated decision to the analyst using a comparison study feature selection method? The authors take multi-criteria decision-making methods for comparison. Here the authors use CICDDoS2019 datasets consisting of Windows benign and the most vanguard for shared bouts. Hill-climbing algorithm may be incorporated to select best features. The time-based pragmatic data can be extracted from the mainsheet for classification as distributed cyber-policy violator or legitimate benign using decision tree (DT) with analytical hierarchy process (AHP) (DT-AHP), support vector machine (SVM) with technique for order of preference by similarity to ideal solution (SVM-TOPSIS) and mixed model of k-nearest neighbor (KNN AHP-TOPSIS) algorithms.
Chapter Preview
Top

Introduction

Cybersecurity is unparalleled and where significant problems that most of us face in today's digital world. These bring it to a significant place in exploration. The availability, confidentiality and integrity of statistics must have provided. This action can be portrayed as intrusive if one of them is threatened by an individual or else one. The cyber-policy violator may classify through passive and active bouts. Passive bouts can screen and examine web congestion and basing on espionage. However, disrupting and blocking of the web may render through active bouts with its normal behaviour. Machine automation can do by applying feature extraction to the data through manual or various algorithms. The extraction of data automatically involves Machine learning. It is a study of investigation in the fields of quantitative analysis, synthetic intelligence and information technology and can refer to as extrapolative analysis or statistical training. The uses and approaches of machine learning in today’s world becoming highly acceptable and prevalent. This learning of machines has categorized through managed and unmanaged algorithms. Here, in this proposal, DT-AHP, SVM-TOPSIS and KNN AHP-TOPSIS managed systems have used for making cyber-policy violator more resilient. Machine automation is highly essential because for processing the intellectual applications like decisions of if, else and to adjust implicit user inputs.

Rest of the section then organized as portion two focused on literature review and its corresponding discussion on cyber-policy violator. Portion three emphasis on taken resources and approaches. Portion four presents investigational outcomes and their routine calculations proportionately. Lastly, the result and our future work placed in portion five.

Key Terms in this Chapter

Dt: Decision tree (DT) is like a hub and stub chain model for decision care schemes including their imaginable significances, occurrence of coincidental consequences, cost of properties and efficacy.

Intrusion Detection: It is an uncovering scheme of hardware devices or software program for analyzing host to its corresponding network and policy violator. It helps us to gather the data of malicious or violated actions centrally in well-defined manner.

AHP: Generally, analytic hierarchy process (AHP) method is using in multifaceted surroundings for machine automation to deal with multi-criteria programming where it is difficult to find out the selected alternatives out of listed feature sets.

SVM: Basically, it is more popular computerized learning replicas can find in managed ML system related to knowledge-based schemes. It can examine data for sorting and retrogressive processes for automated systems.

Machine Learning: Learning and study of CPU algorithms through automation which improvises its actions from its own knowledges. More or less it is the subcategory of AI system.

CICDDoS2019: It is an authorized set of assessment features introduced by Canadian Institute for Cybersecurity which are the ultimate remedies for all existing DDoS inadequacies.

KNN: K-nearest neighbors the only outfit scheme of machine automation for the process of reversion and sorting insufficiencies. It itself uses the data of its scheme and come up with a newer feature set of facts basing on the actions of resemblance. Finally, sorting will be done through majority votes of its neighbors.

TOPSIS: It is an upfront kind of candid MCDM method that is ‘technique of order preference similarity to the ideal solution’. It’s a process of finding results between an idyllic to an anti-idyllic resolution by equating the arbitrary detachment of one substitute to another.

Complete Chapter List

Search this Book:
Reset