Cyber Security Operations Centre A User-Cantered Machine Learning Framework
Cyber Security Operations Centre A User-Cantered Machine Learning Framework
https://doi.org/10.22214/ijraset.2022.44546
International Journal for Research in Applied Science & Engineering Technology (IJRASET)
ISSN: 2321-9653; IC Value: 45.98; SJ Impact Factor: 7.538
Volume 10 Issue VI June 2022- Available at www.ijraset.com
Abstract: To guarantee an organization's Internet security, SIEM (Security Information and Event Management) framework is
about up to disentangle the different preventive advances and banner cautions for security occasions. Examiners (SOC) research
admonitions to make a decision whether this is valid or not. Be that because it may, the number of alerts, when all is claimed in
done, isn't right with the lion's share and is quite the capacity of SCO to deal with all mindfulness. Along these lines, vindictive
chance. Assaults and traded-off hosts won't be right. Machine learning may be a potential way to deal with improving an
inappropriate positive rate and improving the profitability of SOC investigators. During this article, we make a client-driven
architect learning system for the web Safety Functional Centre in a genuine authoritative setting. We speak about customary
information sources in SOC, their work process, and the way to process this information and make a compelling machine
learning framework. This text is focused on two gatherings of pursuers. The first gathering is insightful specialists who have no
information on information researchers or PC wellbeing fields however architects ought to create machine learning frameworks
for machine security. The second gatherings of guests are Internet security specialists that have profound information and skill
in Cyber Security yet Machine learning encounters don't exist and I'd like better to make one with them. Toward the finish of
the paper, we utilize the record as an example to exhibit full strides from information assortment, mark creation, including
designing, machine learning calculation, and test execution assessments utilizing the PC worked within the SOC creation of
Seyondike.
Keywords: Cyber security, Operations Centre, Machine Learning, Security Information, SOC.
I. INTRODUCTION
Through the use of cybersecurity, equipment, programming, and information can be protected from cyberattacks through
frameworks connected to the web. A cyber security system is a collection of advancements and processes intended to protect
computers, networks, projects, and information from attacks and unauthorized access, change, or obliteration. As cyber threats get
more sophisticated, machine learning (ML) and profound learning (DL) technologies can be applied to enhance the security
capacities of cybersecurity networks.
There is no denying that cybersecurity is a vital issue on the internet nowadays, and it is relying on the computerization of a wide
range of significant application zones, including accounts, industry, clinical, and a lot more. This is a key issue that needs to be
resolved urgently: distinguishing between network assaults, especially those that haven't been observed recently. In this paper, past
work in machine learning (ML) and deep learning (DL) for cybersecurity is reviewed, along with a few examples of how each
strategy is applied to cybersecurity tasks.
By using ML and DL, this paper can distinguish cybersecurity dangers, including programmers and predators, spyware, phishing,
and network interruptions. As a result, incredible noticeable quality is achieved by presenting ML/DL techniques in an exhaustive
manner, with references to original works for each. Furthermore, examine ML/DL's potential for cybersecurity and the difficulties
and potentials associated with it.
©IJRASET: All Rights are Reserved | SJ Impact Factor 7.538 | ISRA Journal Impact Factor 7.894 | 4040
International Journal for Research in Applied Science & Engineering Technology (IJRASET)
ISSN: 2321-9653; IC Value: 45.98; SJ Impact Factor: 7.538
Volume 10 Issue VI June 2022- Available at www.ijraset.com
Future work will focus on assessing the effectiveness of the proposed countermeasures in terms of cost-effectiveness. The tool
provides information about the type of attack, frequency, as well as host ID, and source ID of the target host. Cyber-security
frameworks for critical infrastructure have been proposed by Ten et al. using real-time monitoring, anomaly detection, impact
analyses, and mitigation mechanisms.
III. DISADVANTAGES
1) A firewall can be very difficult to configure correctly. Users may not be able to perform Internet-related actions until the
firewall is properly configured if it is configured incorrectly.
2) Slows down the system.
3) Security needs to be maintained by updating the new software.
4) It is more expensive for the average user
5) The only constant is the user.
V. ADVANTAGES
1) Provides protection from viruses, worms, spyware, and other threats
2) Protecting data from theft. It prevents hackers from accessing the computer.
3) Reduces the crashing and freezing of the computer.
4) Provides users with privacy
5) Securing the network edge that is aware of the user
6) A secure mobile communication environment
7) User-centric security management
VI. ARCHITECTURE
©IJRASET: All Rights are Reserved | SJ Impact Factor 7.538 | ISRA Journal Impact Factor 7.894 | 4041
International Journal for Research in Applied Science & Engineering Technology (IJRASET)
ISSN: 2321-9653; IC Value: 45.98; SJ Impact Factor: 7.538
Volume 10 Issue VI June 2022- Available at www.ijraset.com
XI. CONCLUSION
Using gigantic data from numerous security logs, prepared information, and master bits of information, we present a custom-driven
Al system here that can confirm dangerous customers unmistakably. A huge business security action centre can utilize this system
for all-out structures and responses to hazardous customer disclosures. From SOC assessment notes, we demonstrate rapidly how
names can be generated, IP, host, and customers associated to create customer-driven features, Al counts, and survey displays can
be chosen, similar to how such Al structures are created in a SOC environment. Also, we demonstrate that, even when the names of
the data are extremely inconsistent and constrained, the learning structure can still gain more information from them. In comparison
to any current rule-based system, a multi neural framework model typically lifts desires by more than 20%. As part of the Al
structure, data is acquired, ordinary models are reactivated, and continuous scoring is done robotically. This significantly enhances
and overhauls undertaking risk assessment and the board. Regarding future work. We will investigate other learning determinants in
order to enhance further the distinction proof accuracy.
REFERENCES
[1] NIKITA RANA, SHIVANI DHAR, PRIYANKA JAGDALE, NIKHIL JAVALKAR. Implementation of An Expert System for the Enhancement of E
Commerce Security International Journal of Advances in Science Engineering and Technology, ISSN: 2321-9009 Volume-2, Issue-3, July-2014.
[2] VidushiSharma, SachinRai, AnuragDev" A Comprehensive Study of Artificial Neural Networks" International Journal of Advanced Research in Computer
Science and Software Engineering Volume 2, Issue 10, October 2012.
[3] Nalini, M. and Anbu, S., "Anomaly Detection Via Eliminating Data Redundancy and Rectifying Data Error in Uncertain Data Streams", Published in
International Journal of Applied Engineering Research (IJAER), Vol. 9, no. 24, 2014.
[4] Nabil EL KADHI, Karim HADJAR, Nahla EL ZANT "A Mobile Agents and Artificial Neural Networks for Intrusion Detection" JOURNAL OF SOFTWARE,
VOL. 7, NO. 1, JANUARY 2012. 8.
[5] Yaswanth Sai Raj and J. Rene Beulah (2019). "Securing Identification Card Against Unauthorized Access", International Journal of Engineering and Advanced
Technology, vol.8, Issue-3S, pp. 550-553.
[6] Nabil EL KADHI, Karim HADJAR, Nahla EL ZANT "A Mobile Agents and Artificial Neural Networks for Intrusion Detection" JOURNAL OF SOFTWARE,
VOL. 7, NO. 1, JANUARY 2012. 8.
©IJRASET: All Rights are Reserved | SJ Impact Factor 7.538 | ISRA Journal Impact Factor 7.894 | 4042
International Journal for Research in Applied Science & Engineering Technology (IJRASET)
ISSN: 2321-9653; IC Value: 45.98; SJ Impact Factor: 7.538
Volume 10 Issue VI June 2022- Available at www.ijraset.com
[7] Devi krishna KS, Ramakrishna B B "An Artificial Neural Network-based Intrusion Detection System and Classification of Attacks"International Journal of
Engineering Research and Applications (IJERA) Vol. 3, Issue 4, Jul-Aug 2013, pp. 1959-1964.
[8] M.M. Gamal, B. Hasan, and A.F. Hegazy, "A Security Analysis Framework Powered by an Expert System," International Journal of Computer Science and
Security (IJCSS), Vol. 4, no. 6, pp. 505-527, Feb. 2011.
[9] Dr. Bhutada, PreetiBhutada.Applications of Artificial Intelligence in Cybersecurity International Journal of Engineering Research in Computer Science and
Engineering (IJERCSE) Vol 5, Issue 4, April 2018 All Rights Reserved © 2018 IJERCSE 214.
[10] S. Poonia, A. Bhardwaj, G. S. Dangayach, (2011) "Cyber Crime: Practices and Policies for Its Prevention", The First International Conference on
Interdisciplinary Research and Development, Special No. of the International Journal of the Computer, the Internet and Management, Vol. 19, No. SP1.
[11] S. Choudhury and A. Bhowal. Comparative analysis of machine learning algorithms along with classifiers for network intrusion detection, Smart Technologies
and Management for Computing, Communication, Controls, Energy and Materials (ICSTM), 2015.
©IJRASET: All Rights are Reserved | SJ Impact Factor 7.538 | ISRA Journal Impact Factor 7.894 | 4043