Please use this identifier to cite or link to this item: http://localhost:8080/xmlui/handle/123456789/9681
Full metadata record
DC FieldValueLanguage
dc.contributor.authorKhattab M. Ali Alheet, Abdulkareem Alzahrani-
dc.contributor.authorOmar Hammad jasim, Duaa Al-Dosary-
dc.contributor.authorHamsa M. Ahmed, Muzhir Shaban Al-Ani-
dc.date.accessioned2025-02-17T09:33:45Z-
dc.date.available2025-02-17T09:33:45Z-
dc.date.issued2023-04-17-
dc.identifier.issn979-8-3503-3514-9-
dc.identifier.urihttp://localhost:8080/xmlui/handle/123456789/9681-
dc.description.abstractCyber-attacks involve stifling processes and activities, conciliating data, or restricting data access by carefully modifying computer systems and networks with malware. There has been a significant increase in these types of attacks over time. Due to the rise in complexity and structure, advanced defensive methods are needed. In the face of growing security threats, traditional methods of identifying cyber attacks are ineffective. In this paper, the intelligent of intrusion a detection system is suggested. Moreover, the suggested system attempts to evaluate the capability of the k-nearest neighbour’s algorithm (KNN) in terms of distinguishing between authentic and tampered data. A reliable dataset named the Multi-Step Cyber-Attack Dataset (MSCAD) is utilized to determine the behavior Among the new sorts of attacks. Moreover, 60% of the dataset was utilized for training the model, and a remaining 40% was used for testing. Evaluation metrics like accuracy, precision, recall, and F1 score are used. Experiments suggest that the proposed system-based KNN could enhance detection performance. Moreover, the suggested approach increases detection accuracy while minimizing false alarms.en_US
dc.language.isoenen_US
dc.publisherIEEE 15th International Conference on Developments in eSystems Engineering (DeSE)en_US
dc.subjectCyber-attacksen_US
dc.subjectintrusion detection systemen_US
dc.subjectKNNen_US
dc.subjectMSCADen_US
dc.subjectaccuracyen_US
dc.titleIntelligent Detection System for Multi-Step Cyber Attack Based on Machine Learningen_US
dc.typeOtheren_US
Appears in Collections:قسم نظم المعلومات

Files in This Item:
File Description SizeFormat 
Intelligent_Detection_System_for_Multi-Step_Cyber-Attack_Based_on_Machine_Learning.pdf3.74 MBAdobe PDFView/Open


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.