2021
DOI: 10.7717/peerj-cs.475
|View full text |Cite
|
Sign up to set email alerts
|

Cyber-attack method and perpetrator prediction using machine learning algorithms

Abstract: Cyber-attacks have become one of the biggest problems of the world. They cause serious financial damages to countries and people every day. The increase in cyber-attacks also brings along cyber-crime. The key factors in the fight against crime and criminals are identifying the perpetrators of cyber-crime and understanding the methods of attack. Detecting and avoiding cyber-attacks are difficult tasks. However, researchers have recently been solving these problems by developing security models and making predic… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
6
0
3

Year Published

2021
2021
2024
2024

Publication Types

Select...
6
2

Relationship

1
7

Authors

Journals

citations
Cited by 30 publications
(9 citation statements)
references
References 33 publications
0
6
0
3
Order By: Relevance
“…The authors surveyed different DM-ML approaches for malware detection [30], [31]. In another paper, the authors used a Deep learning methodology is used for forecasting cyber-attacks based on the captured data from network traffic [32], [33]. In another paper [34], cyber-attack methods and committers have been predicted using Support Vector Machine (SVM), an ML algorithm.…”
Section: Literature Reviewmentioning
confidence: 99%
“…The authors surveyed different DM-ML approaches for malware detection [30], [31]. In another paper, the authors used a Deep learning methodology is used for forecasting cyber-attacks based on the captured data from network traffic [32], [33]. In another paper [34], cyber-attack methods and committers have been predicted using Support Vector Machine (SVM), an ML algorithm.…”
Section: Literature Reviewmentioning
confidence: 99%
“…Daha önce yapılan çalışma [18] ile karşılaştırıldığında Lineer, Polinom, Lasso ve Ridge Regresyon modellerinin daha başarısız olduğu yeni modelin yeterince başarı elde edemediği görülmüştür.…”
Section: şEkil 1 Algoritmaların Doğruluk Karşılaştırmasıunclassified
“…Uygulanan modelde lineer, ridge ve lasso regresyon doğruluk oranlarının çok düşük olduğundan başarısız olduğu tespit edilmiştir. Polinom regresyon yönteminde ise 0.79 R Square doğruluk oranıyla 4 yöntem arasında en başarılı yöntem olduğu görülmüş olsa da daha önce benzer yapılan çalışmaya [18] göre başarı oranı düşük kalmıştır. Yapılan çalışmada polinom regresyon modelinin geliştirilmesi halinde suç analizi ve tahminlerde kullanılabileceği değerlendirilmektedir.…”
Section: Sonuçlarunclassified
See 1 more Smart Citation
“…An additional risk regarding a breach of patient confidentiality could derive from so-called "membership inference attacks, " i.e., malicious attacks toward AI algorithms which are aimed at detecting the confidential data used to build the algorithm (Shokri et al, 2017). Actually, the implementation of AI systems means access to sensitive health data, which intrinsically always carries the risk of cyberattacks, posing a substantial risk on the privacy of patients (especially those with lower education and financial income; Bilen and Özer, 2021) and requiring a guaranteed level of robustness against such attacks (Catak et al, 2021;Zhou et al, 2021). Attacks on AI systems can undermine diagnostic accuracy, administer lethal drug doses, or sabotage critical moves in an operation, and in the area of diagnostic imaging, they can manipulate data entering AI systems (so-called "input attacks"), leading to false diagnosis and altered patient care and/or reimbursement (Finlayson et al, 2019;Kiener, 2020;Myers et al, 2020).…”
Section: Data Confidentiality and Regulation Policiesmentioning
confidence: 99%