Event Profiles based Cyber Threat Detection using ANN

Authors

  • K.RAMBABU (Assistant Professor),Master of Computer Applications,DNR collage, Bhimavaram,Andhra Pradesh.Pradesh Author
  • Bhrugubanda Venkata Lakshmi Geetha Sri PG scholar, Department of MCA, DNR college, Bhimavaram, Andhra Pradesh Author

Keywords:

Cyber wellbeing, interference zone, local area security, man-made cognizance, significant neural offices.

Abstract

One of the huge issues in local area security is the course of action of an automated and a hit virtual threats recognizable proof method. In this paper, we present an AI technique for virtual dangers disclosure, in gentle of fake neural associations. The suggested system changes tremendous volumes of collected threat incidents to profiles of solitary occasions and uses a major learning-essentially focused area approach for the redesign of advanced risk character. We have established an AI-SIEM framework for these works of art that is subject to a combination of Occasion profiling, such as FCNN, CNN, and LSTM, for preprocessing calculations and assorted bogus neural workplace techniques. Among prominent good and sham great cautions, the machine offices round isolate, while reassuring assurance specialists to quickly respond to virtual hazards. All tests in this exploration are done through makers utilizing two benchmark datasets (NSLKDD and CICIDS2017) and datasets amassed indeed. To confirm the introduction connection with current methodologies, we drove evaluations utilizing the 5 typical AI strategies (SVM, alright NN, RF, NB, and DT). Thusly, the test eventual outcomes of this examination guarantee that our proposed methods are prepared for being used as becoming acquainted with based styles for network interference area, and show that paying little mind to the truth that it is used in all actuality, the introduction beats the conventional AI methodologies. In this paper author is describing concept to detect threats using AI-SIEM (Artificial Intelligence-Security Information and Event Management) technique which is a combination of deep learning algorithms such as FCNN, CNN (Convolution Neural Networks) and LSTM (long short term memory) and this technique works based on events profiling such as attack signatures. Author evaluating propose work performance with conventional algorithms such as SVM, Decision Tree, Random Forest, KNN and Naïve Bayes. Here I am implementing CNN and LSTM algorithms.

Downloads

Published

2025-04-25

Issue

Section

Articles

How to Cite

Event Profiles based Cyber Threat Detection using ANN. (2025). International Journal of Engineering and Science Research, 15(2s), 241-247. https://ijesr.org/index.php/ijesr/article/view/289

Most read articles by the same author(s)

Similar Articles

1-10 of 201

You may also start an advanced similarity search for this article.