0% found this document useful (0 votes)
103 views6 pages

Cyber Security Operations Centre A User-Cantered Machine Learning Framework

To guarantee an organization's Internet security, SIEM (Security Information and Event Management) framework is about up to disentangle the different preventive advances and banner cautions for security occasions. Examiners (SOC) research admonitions to make a decision whether this is valid or not.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
103 views6 pages

Cyber Security Operations Centre A User-Cantered Machine Learning Framework

To guarantee an organization's Internet security, SIEM (Security Information and Event Management) framework is about up to disentangle the different preventive advances and banner cautions for security occasions. Examiners (SOC) research admonitions to make a decision whether this is valid or not.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 6

10 VI June 2022

https://doi.org/10.22214/ijraset.2022.44546
International Journal for Research in Applied Science & Engineering Technology (IJRASET)
ISSN: 2321-9653; IC Value: 45.98; SJ Impact Factor: 7.538
Volume 10 Issue VI June 2022- Available at www.ijraset.com

Cyber Security Operations Centre: A User-


Cantered Machine Learning Framework
Swetha Nalanagula1, Arpita Roy2
1, 2
St. Thomas College of Engineering & Technology

Abstract: To guarantee an organization's Internet security, SIEM (Security Information and Event Management) framework is
about up to disentangle the different preventive advances and banner cautions for security occasions. Examiners (SOC) research
admonitions to make a decision whether this is valid or not. Be that because it may, the number of alerts, when all is claimed in
done, isn't right with the lion's share and is quite the capacity of SCO to deal with all mindfulness. Along these lines, vindictive
chance. Assaults and traded-off hosts won't be right. Machine learning may be a potential way to deal with improving an
inappropriate positive rate and improving the profitability of SOC investigators. During this article, we make a client-driven
architect learning system for the web Safety Functional Centre in a genuine authoritative setting. We speak about customary
information sources in SOC, their work process, and the way to process this information and make a compelling machine
learning framework. This text is focused on two gatherings of pursuers. The first gathering is insightful specialists who have no
information on information researchers or PC wellbeing fields however architects ought to create machine learning frameworks
for machine security. The second gatherings of guests are Internet security specialists that have profound information and skill
in Cyber Security yet Machine learning encounters don't exist and I'd like better to make one with them. Toward the finish of
the paper, we utilize the record as an example to exhibit full strides from information assortment, mark creation, including
designing, machine learning calculation, and test execution assessments utilizing the PC worked within the SOC creation of
Seyondike.
Keywords: Cyber security, Operations Centre, Machine Learning, Security Information, SOC.

I. INTRODUCTION
Through the use of cybersecurity, equipment, programming, and information can be protected from cyberattacks through
frameworks connected to the web. A cyber security system is a collection of advancements and processes intended to protect
computers, networks, projects, and information from attacks and unauthorized access, change, or obliteration. As cyber threats get
more sophisticated, machine learning (ML) and profound learning (DL) technologies can be applied to enhance the security
capacities of cybersecurity networks.
There is no denying that cybersecurity is a vital issue on the internet nowadays, and it is relying on the computerization of a wide
range of significant application zones, including accounts, industry, clinical, and a lot more. This is a key issue that needs to be
resolved urgently: distinguishing between network assaults, especially those that haven't been observed recently. In this paper, past
work in machine learning (ML) and deep learning (DL) for cybersecurity is reviewed, along with a few examples of how each
strategy is applied to cybersecurity tasks.
By using ML and DL, this paper can distinguish cybersecurity dangers, including programmers and predators, spyware, phishing,
and network interruptions. As a result, incredible noticeable quality is achieved by presenting ML/DL techniques in an exhaustive
manner, with references to original works for each. Furthermore, examine ML/DL's potential for cybersecurity and the difficulties
and potentials associated with it.

II. EXISTING SYSTEM


With most security approaches, end-users have been neglected or not taken into account in the enterprise. Traditional security
measures, such as firewalls and intrusion detection and prevention systems, are designed to protect networks primarily at the
network layer. In light of the new security challenges described in the previous section, such an approach has limitations, even
though it is still part of the overall security story. The goal of Data Analysis for Network Cybersecurity is to monitor and analyse
network traffic data in an effort to prevent or identify, malicious activity as early as possible. In order to conduct a detailed risk
assessment, information security management systems (ISMSs) were introduced and risk values were quantitatively evaluated. In
the quantitative evaluation, it was found that the countermeasures proposed could reduce risk in some ways.

©IJRASET: All Rights are Reserved | SJ Impact Factor 7.538 | ISRA Journal Impact Factor 7.894 | 4040
International Journal for Research in Applied Science & Engineering Technology (IJRASET)
ISSN: 2321-9653; IC Value: 45.98; SJ Impact Factor: 7.538
Volume 10 Issue VI June 2022- Available at www.ijraset.com

Future work will focus on assessing the effectiveness of the proposed countermeasures in terms of cost-effectiveness. The tool
provides information about the type of attack, frequency, as well as host ID, and source ID of the target host. Cyber-security
frameworks for critical infrastructure have been proposed by Ten et al. using real-time monitoring, anomaly detection, impact
analyses, and mitigation mechanisms.

III. DISADVANTAGES
1) A firewall can be very difficult to configure correctly. Users may not be able to perform Internet-related actions until the
firewall is properly configured if it is configured incorrectly.
2) Slows down the system.
3) Security needs to be maintained by updating the new software.
4) It is more expensive for the average user
5) The only constant is the user.

IV. PROPOSED SYSTEM


In order to reduce the risk associated with fast-evolving end-user realities, user-centric cybersecurity reinforces security closer to
end-users. This is not the same as user security. User-centric cybersecurity is the process of preserving the integrity of an enterprise
network and its assets while responding to people's needs. It is almost as if user security is about protecting the network from the
user — protecting it against vulnerabilities that the user introduces. For enterprises, user-centric security is more valuable because
cyber-security systems are independent, real-time, and robust systems with high-performance requirements. In addition to critical
infrastructures, such as the national power grid, transportation, medical, and defence, they are used in a wide range of
applications. Computing, communication, and control technological systems must be integrated tightly to achieve stability,
performance, reliability, efficiency, and robustness in these applications. Due to their complexity and cyber-security connectivity,
critical infrastructures have always been a target of criminals and are subject to security threats. As a result of attacks on people,
processes, technology, or other components, or when risk management systems are inadequate, lacking or failing these CPSs
experience security breaches. This project aims to reduce unwanted data in a dataset targeted by attackers.

V. ADVANTAGES
1) Provides protection from viruses, worms, spyware, and other threats
2) Protecting data from theft. It prevents hackers from accessing the computer.
3) Reduces the crashing and freezing of the computer.
4) Provides users with privacy
5) Securing the network edge that is aware of the user
6) A secure mobile communication environment
7) User-centric security management

VI. ARCHITECTURE

©IJRASET: All Rights are Reserved | SJ Impact Factor 7.538 | ISRA Journal Impact Factor 7.894 | 4041
International Journal for Research in Applied Science & Engineering Technology (IJRASET)
ISSN: 2321-9653; IC Value: 45.98; SJ Impact Factor: 7.538
Volume 10 Issue VI June 2022- Available at www.ijraset.com

VII. CYBER ANALYSIS


By analysing the information vulnerabilities within and outside an organization, cyber threat analysts are able to compare the
information against real-world cyberattacks. This threat-oriented approach to cyber security represents a smooth transition from
reactive security to proactive security in the fight against cyberattacks. Moreover, the goal of a threat assessment is to provide best
practices on how to maximize the protection instruments in terms of availability, confidentiality, and integrity, without
compromising usability or functionality. CYPER ANALYSIS. Threats could include interruptions, interference, or destruction of
any value added to the firm's portfolio. An analysis must scrutinize each element posing any security risk, regardless of whether it is
of "human" or "non-human" origin.

VIII. DATASET MODIFICATION


When a dataset in your dashboard contains many dataset objects, specific dataset objects can be hidden from display in the Datasets
panel. A large amount of data can be imported into the Web without removing all unwanted columns before it can be hidden, so the
unwanted attributes and metrics can be hidden. In the Datasets panel, you can hide dataset objects, display hidden objects, rename a
dataset object, or create metrics based on attributes, a metric can be used to create an attribute, a geo role can be defined for an
attribute, a time-based attribute can be created, and a dataset object can be replaced in a dashboard.

IX. DATA REDUCTION


You can improve storage efficiency by using data reduction techniques and capacity optimization techniques, such as deduplication,
compression, snapshots and thin provisioning. Data reduction can be achieved by simply deleting unwanted or unneeded
information.

X. RISK USER DETECTION


The detection rate is high to protect all types of goods from theft, False alarm immunity to prevent customer embarrassment, Wide-
exit coverage enhances flexibility for layouts of entrances and exits, and a wide array of attractive designs compliment any store
décor, and Advanced digital controller technology ensures optimal system performance.

XI. CONCLUSION
Using gigantic data from numerous security logs, prepared information, and master bits of information, we present a custom-driven
Al system here that can confirm dangerous customers unmistakably. A huge business security action centre can utilize this system
for all-out structures and responses to hazardous customer disclosures. From SOC assessment notes, we demonstrate rapidly how
names can be generated, IP, host, and customers associated to create customer-driven features, Al counts, and survey displays can
be chosen, similar to how such Al structures are created in a SOC environment. Also, we demonstrate that, even when the names of
the data are extremely inconsistent and constrained, the learning structure can still gain more information from them. In comparison
to any current rule-based system, a multi neural framework model typically lifts desires by more than 20%. As part of the Al
structure, data is acquired, ordinary models are reactivated, and continuous scoring is done robotically. This significantly enhances
and overhauls undertaking risk assessment and the board. Regarding future work. We will investigate other learning determinants in
order to enhance further the distinction proof accuracy.

REFERENCES
[1] NIKITA RANA, SHIVANI DHAR, PRIYANKA JAGDALE, NIKHIL JAVALKAR. Implementation of An Expert System for the Enhancement of E
Commerce Security International Journal of Advances in Science Engineering and Technology, ISSN: 2321-9009 Volume-2, Issue-3, July-2014.
[2] VidushiSharma, SachinRai, AnuragDev" A Comprehensive Study of Artificial Neural Networks" International Journal of Advanced Research in Computer
Science and Software Engineering Volume 2, Issue 10, October 2012.
[3] Nalini, M. and Anbu, S., "Anomaly Detection Via Eliminating Data Redundancy and Rectifying Data Error in Uncertain Data Streams", Published in
International Journal of Applied Engineering Research (IJAER), Vol. 9, no. 24, 2014.
[4] Nabil EL KADHI, Karim HADJAR, Nahla EL ZANT "A Mobile Agents and Artificial Neural Networks for Intrusion Detection" JOURNAL OF SOFTWARE,
VOL. 7, NO. 1, JANUARY 2012. 8.
[5] Yaswanth Sai Raj and J. Rene Beulah (2019). "Securing Identification Card Against Unauthorized Access", International Journal of Engineering and Advanced
Technology, vol.8, Issue-3S, pp. 550-553.
[6] Nabil EL KADHI, Karim HADJAR, Nahla EL ZANT "A Mobile Agents and Artificial Neural Networks for Intrusion Detection" JOURNAL OF SOFTWARE,
VOL. 7, NO. 1, JANUARY 2012. 8.

©IJRASET: All Rights are Reserved | SJ Impact Factor 7.538 | ISRA Journal Impact Factor 7.894 | 4042
International Journal for Research in Applied Science & Engineering Technology (IJRASET)
ISSN: 2321-9653; IC Value: 45.98; SJ Impact Factor: 7.538
Volume 10 Issue VI June 2022- Available at www.ijraset.com

[7] Devi krishna KS, Ramakrishna B B "An Artificial Neural Network-based Intrusion Detection System and Classification of Attacks"International Journal of
Engineering Research and Applications (IJERA) Vol. 3, Issue 4, Jul-Aug 2013, pp. 1959-1964.
[8] M.M. Gamal, B. Hasan, and A.F. Hegazy, "A Security Analysis Framework Powered by an Expert System," International Journal of Computer Science and
Security (IJCSS), Vol. 4, no. 6, pp. 505-527, Feb. 2011.
[9] Dr. Bhutada, PreetiBhutada.Applications of Artificial Intelligence in Cybersecurity International Journal of Engineering Research in Computer Science and
Engineering (IJERCSE) Vol 5, Issue 4, April 2018 All Rights Reserved © 2018 IJERCSE 214.
[10] S. Poonia, A. Bhardwaj, G. S. Dangayach, (2011) "Cyber Crime: Practices and Policies for Its Prevention", The First International Conference on
Interdisciplinary Research and Development, Special No. of the International Journal of the Computer, the Internet and Management, Vol. 19, No. SP1.
[11] S. Choudhury and A. Bhowal. Comparative analysis of machine learning algorithms along with classifiers for network intrusion detection, Smart Technologies
and Management for Computing, Communication, Controls, Energy and Materials (ICSTM), 2015.

©IJRASET: All Rights are Reserved | SJ Impact Factor 7.538 | ISRA Journal Impact Factor 7.894 | 4043

You might also like