The development of a model for the threat detection system with the use of machine learning and neural network methods
Ussatova O. Zhumabekova A. Karyukin V. Matson E.T. Ussatov N.
2024Innovative Research Publishing
International Journal of Innovative Research and Scientific Studies
2024#7Issue 3863 - 877 pp.
This study examines the development of a model for the threat detection system with the use of machine learning and neural network methods. The fast development of Internet technologies has led to the appearance of many digit a l sy st em s and platforms. However, despite the impressive technological progress, another side also emerged in the spread of a massive number of different cyber threats. Although various ways have been created to detect and prevent them, the threats are also developing a nd becoming more complex each year. Therefore, new system defense and data protection methods using machine and deep learning approaches ha ve been proposed recently. The methods based on these approaches have proved to be especially effective in the wave of new Artificial Intelligence applications. In this paper, a threat detection system has been designed to disclose different kinds of threa ts while maintaining the security, confidentiality, and availability of the computer system. The development of machine learning m odels for detecting DDoS and man-in-the-middle attacks, Structured Query Language (SQL) injections, phishing, and malware was examined. The data scaling, feature selection, feature extraction, and classification steps were also thoroughly described. Naïve Bayes, Logistic Regression, Decision Tree, Random Forest, XGBoost, CatBoost, and Deep Neural Network algorithms were utilized for training the cyber threat detection models. The experimental results evaluated all the models using accuracy, precision, recall, and F1-score metrics. The best models achieved scores in the range of 0.90 to 1.00.
Artificial intelligence , Cyberattacks , DDoS , Defence system , Machine learning , Malware , Man-in-the-Middle , Neural networks , Phishing , SQL injection
Text of the article Перейти на текст статьи
Institute of Information and Computational Technologies, Almaty, Kazakhstan
Al-Farabi Kazakh National University, Almaty, Kazakhstan
Almaty University of Power Engineering and Telecommunications named after G. Daukeyev, Almaty, Kazakhstan
Purdue University, West Lafayette, United States
Turan University, Almaty, Kazakhstan
Institute of Information and Computational Technologies
Al-Farabi Kazakh National University
Almaty University of Power Engineering and Telecommunications named after G. Daukeyev
Purdue University
Turan University
10 лет помогаем публиковать статьи Международный издатель
Книга Публикация научной статьи Волощук 2026 Book Publication of a scientific article 2026