Author
Listed:
- Muhammad Shujat Ali, Ahsan Abbas, Abdullah Faisal, Anza Riaz,Imran Siddiq
(Orange Networks, Lahore, Pakistan. Afro-Asian Institute Affiliated with Government College University Faisalabad, Pakistan. Government College University Faisalabad Layyah Campus, Pakistan. Telenor bank,Lahore,Pakistan)
Abstract
Inter and intra-network connectivity have become a useful resource for accessibility and flexibility of data for different organizations. Online services are increasing day by day, everything is available online, it generates a huge amount of data, that require cyber security revolves for ensuring secure interconnectivity between devices. Because of an exponential increase in internet users and cyber-attacks, the data security and credibility of various organizations is on stake. In the continued development of the threat environment, cyber security experts deal with numerous threats on daily basis. As multiple attacks on computer networks and systems are becoming stronger each day therefore current security tools are often inadequate to resolve issues relating to unauthorized users, reliability, and reliable network security. To maintain a safe environment, Intrusion-Detection Mechanisms (IDS) enabled to control device functions and detect intrusions should typically be used to supplement with other protection strategies; for which conventional security methods are inadequate. Actual users expect their requested information to be processed in real-time, while malicious traffic needs to be mitigated just as quickly as possible. As traffic increases, this problem becomes more complex. This paper contributes a detailed analysis of network packets to find anomaly detection based on the UNSW NB 15 dataset and investigate the the difference between IP packet behavior for both malicious and legitimate packets. Besides we acquaint with new methodologies to illuminate and appraise the network attack in a very proficient way using different machine learning algorithms which will accomplish locating the malicious traffic in the least execution time with precision.
Suggested Citation
Muhammad Shujat Ali, Ahsan Abbas, Abdullah Faisal, Anza Riaz,Imran Siddiq, 2022.
"Enterprise Network Infrastructure Malicious Activity Analysis,"
International Journal of Innovations in Science & Technology, 50sea, vol. 4(4), pages 982-997, October.
Handle:
RePEc:abq:ijist1:v:4:y:2022:i:4:p:982-997
Download full text from publisher
Corrections
All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:abq:ijist1:v:4:y:2022:i:4:p:982-997. See general information about how to correct material in RePEc.
If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.
We have no bibliographic references for this item. You can help adding them by using this form .
If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.
For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: Iqra Nazeer (email available below). General contact details of provider: .
Please note that corrections may take a couple of weeks to filter through
the various RePEc services.