Behavioral Attack Detection in Intranet Network Using Advanced Machine Learning Techniques

Authors

  • C. Kusuma Master Of Computer Applications (MCA) Student, KMM Institute of Postgraduate Studies, Tirupathi(D), Andhra Pradesh, India Author
  • G. V. S. Ananthnath Associate Professor, Master Of Computer Applications(MCA), KMM Institute of Postgraduate Studies, Tirupathi(D), Andhra Pradesh, India Author

Keywords:

Machine Learning, Intrusion Detection, Behavior-based Attacks, Cybersecurity, Network Security

Abstract

In the cybersecurity landscape, detecting intranet attacks remains particularly challenging as hostile tactics constantly adapt and evolve. This research introduces an innovative machine learning approach that identifies potential threats by analyzing behavioral patterns rather than relying on fixed signatures. The methodology harnesses advanced algorithms to recognize and counter intranet-based attacks by identifying anomalous behaviors that deviate from established usage patterns. By examining network traffic and system logs, our model differentiates between normal and suspicious activities, enabling it to detect and respond to threats proactively. This approach shows significant promise for strengthening intranet security through its real-time monitoring capabilities and adaptive defense systems. The solution enhances security posture by continuously analyzing behavior patterns and identifying potential threats before they can cause damage. Our empirical evaluations and comparative analyses confirm the model's effectiveness. Test results demonstrate how it successfully identifies anomalies that traditional security measures might miss, while maintaining a low rate of false positives. This technology complements existing cybersecurity frameworks rather than replacing them, providing an additional layer of protection. The integration creates a more robust defense system for intranet environments, particularly against sophisticated and evolving threats.

Downloads

Download data is not yet available.

References

V. Agate, D. A. Felice Maria, A. De Paola, P. Ferraro, G. L. Re, and M. Morana, "A Behavior-Based Intrusion Detection System Using Ensemble Learning Techniques," in ITASEC, 2022, pp. 207-218.

S. Bagui et al., "Detecting reconnaissance and discovery tactics from the MITRE ATT&CK framework in Zeek conn logs using spark’s machine learning in the big data framework," vol. 22, no. 20, p. 7999, 2022.

M. Rodríguez, Á. Alesanco, L. Mehavilla, and J. J. S. García, "Evaluation of machine learning techniques for traffic flow-based intrusion detection," vol. 22, no. 23, p. 9326, 2022.

C. Chethana, P. K. Pareek, V. H. C. de Albuquerque, A. Khanna, and D. Gupta, "Improved Domain Generation Algorithm To Detect Cyber-Attack With Deep Learning Techniques," in 2022 IEEE 2nd Mysore Sub Section International Conference (MysuruCon), 2022, pp. 1-8: IEEE.

Y. Yin et al., "IGRF-RFE: a hybrid feature selection method for MLP-based network intrusion detection on UNSW-NB15 dataset," vol. 10, no. 1, p. 15, 2023.

Downloads

Published

03-05-2025

Issue

Section

Research Articles