An NLP-Based Approach to Fortifying Cyber Defenses
Keywords:
cybersecurity, fortifying, GDELT, Exploits Database, OTXAbstract
This research introduces an innovative approach to fortifying cybersecurity defenses through behavior-based anomaly detection and response mechanisms. Leveraging NLP techniques, our LLM analyzes system logs and Websites to identify anomalous patterns indicative for classification of the type of attack. On analysis of the datasets “Exploits Database”,” GDELT” and “OTX”, the system accurately detects deviations and dynamically suggests security measures based on the severity and class of attack. Evaluation on diverse datasets showcases the model's superiority over traditional signature-based methods, emphasizing its efficacy in identifying novel and sophisticated cyber threats. The model has an accuracy of 71.22% in classifying large amount of unlabeled data. This research contributes valuable insights to the ongoing efforts in fortifying digital ecosystems against evolving cybersecurity challenges.
Downloads
References
S. Srinivasan and P. Deepalakshmi, "Enhancing the security in cyber-world by detecting the botnets using ensemble classification based machine learning," Measurement: Sensors, vol. 25, p. 100624, 2023.
M. Amine Ferrag, M. Ndhlovu, N. Tihanyi, L. C. Cordeiro, M. Debbah and T. Lestable, "Revolutionizing Cyber Threat Detection with Large Language Models," arXiv e-prints, p. arXiv–2306, 2023.
W. S. Admass, Y. Y. Munaye and A. A. Diro, "Cyber Security and Applications".
M. E. Dapel, M. Asante, C. D. Uba and M. O. Agyeman, "Artificial Intelligence Techniques in Cybersecurity Management," in Cybersecurity in the Age of Smart Societies: Proceedings of the 14th International Conference on Global Security, Safety and Sustainability, London, September 2022, 2023.
Ó. Mogollón-Gutiérrez, J. C. Sancho Núñez, M. Á. Vegas and A. Caro Lindo, "A Novel Ensemble Learning System for Cyberattack Classification.," Intelligent Automation & Soft Computing, vol. 37, 2023.
D.-W. Kim, G.-Y. Shin and M.-M. Han, "Anomaly Detection Based on Discrete Wavelet Transformation for Insider Threat Classification.," Comput. Syst. Sci. Eng., vol. 46, p. 153–164, 2023.
F. S. Alrayes, N. Alotaibi, J. S. Alzahrani, S. Alazwari, A. Alhogail, A. M. Al-Sharafi, M. Othman and M. A. Hamza, "Enhanced Gorilla Troops Optimizer with DL Enabled Cybersecurity Threat Detection," Computer Systems Science & Engineering, vol. 45, 2023.
S. Silvestri, S. Islam, S. Papastergiou, C. Tzagkarakis and M. Ciampi, "A Machine Learning Approach for the NLP-Based Analysis of Cyber Threats and Vulnerabilities of the Healthcare Ecosystem," Sensors, vol. 23, p. 651, 2023.
M. Al-Essa, G. Andresini, A. Appice and D. Malerba, "PANACEA: a neural model ensemble for cyber-threat detection," Machine Learning, p. 1–44, 2024.
N. A. M. Razali, N. A. Malizan, N. A. Hasbullah, M. Wook, N. M. Zainuddin, K. K. Ishak, S. Ramli and S. Sukardi, "Political Security Threat Prediction Framework Using Hybrid Lexicon-Based Approach and Machine Learning Technique," IEEE Access, vol. 11, p. 17151–17164, 2023.
K. U. Abinesh Kamal and S. V. Divya, "Integrated threat intelligence platform for security operations in organizations," Automatika, vol. 65, p. 401–409, 2024.
M. H. Kabir, A. Hasnat, A. J. Mahdi, M. N. Hasan, J. A. Chowdhury and I. M. Fahim, "Enhancing Insider Malware Detection Accuracy with Machine Learning Algorithms," Engineering Proceedings, vol. 58, p. 104, 2023.
A. Darem, A. A. Alhashmi, T. M. Alkhaldi, A. M. Alashjaee, S. M. Alanazi and S. A. Ebad, "Cyber threats classifications and countermeasures in banking and financial sector," IEEE Access, vol. 11, p. 125138–125158, 2023.
O. Cherqi, Y. Moukafih, M. Ghogho and H. Benbrahim, "Enhancing Cyber Threat Identification in Open-Source Intelligence Feeds through an Improved Semi-Supervised Generative Adversarial Learning Approach with Contrastive Learning," IEEE Access, 2023.
P. Das, M. R. Al Asif, S. Jahan, R. Khondoker, K. Ahmed and F. M. Bui, "STRIDE-Based Cybersecurity Threat Modeling, Risk Assessment and Treatment of an Infotainment High Performance Computing (HPC) System," 2024.
["Exploits database," Offsec, 4 november 2009. [Online]. Available: https://exploit-db.com/. [Accessed 27 Jan 2024].
M. Singhal, N. Kumarswamy, S. Kinhekar and S. Nilizadeh, "Cybersecurity Misinformation Detection on Social Media: Case Studies on Phishing Reports and Zoom’s Threat," in Proceedings of the International AAAI Conference on Web and Social Media, 2023.
W. Chung, Y. Zhang and J. Pan, "A theory-based deep-learning approach to detecting disinformation in financial social media," Information Systems Frontiers, vol. 25, p. 473–492, 2023.
N. Sun, M. Ding, J. Jiang, W. Xu, X. Mo, Y. Tai and J. Zhang, "Cyber Threat Intelligence Mining for Proactive Cybersecurity Defense: A Survey and New Perspectives," IEEE Communications Surveys & Tutorials, 2023.
Downloads
Published
How to Cite
Issue
Section
License
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
All papers should be submitted electronically. All submitted manuscripts must be original work that is not under submission at another journal or under consideration for publication in another form, such as a monograph or chapter of a book. Authors of submitted papers are obligated not to submit their paper for publication elsewhere until an editorial decision is rendered on their submission. Further, authors of accepted papers are prohibited from publishing the results in other publications that appear before the paper is published in the Journal unless they receive approval for doing so from the Editor-In-Chief.
IJISAE open access articles are licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. This license lets the audience to give appropriate credit, provide a link to the license, and indicate if changes were made and if they remix, transform, or build upon the material, they must distribute contributions under the same license as the original.