Analysis of Persistent Threat Detection Using Behavioral Analytics

Analysis of Persistent Threat Detection Using Behavioral Analytics

Performance Analysis of Persistent Threat Detection Using Behavioral Analytics and Anomaly Detection

implementation plan:
====================

Step 1: Initially, We collect and load the data from ” DAPT2020 dataset ”

Step 2: Then, we preprocess the data using K Means-SMOTE (K-means clustering with Synthetic minority Oversampling Technique) method for Imbalance handling with Label encoding Modeling.

Step 3: Next, we perform a feature engineering process and then train the data using the ARM-ETC algorithm with Association Rule Mining and Extra Tree Classifier.

Step 4: Next, we analyze complex dynamic behaviors of APT malware using GP (Genetic Programming) algorithm.

Step 5: Next, we implement the IKC-HMM algorithm for detecting the anomalies in APT.

Step 6: Finally, we plot graph for the following metrics:

6.1: No. of Epochs vs. Accuracy (%)
6.2: No. of Epochs vs. Precision (%)
6.3: No. of Epochs vs. Recall (%)
6.4: No. of Epochs vs. F1-Score (%)
6.5: Confusion Matrix

Software Requirements:
———————-

1. Development Tool: Python 3.11.4
2. Operating System: Windows-11(64-bit)

Dataset:
——-

Dataset link: https: www.kaggle.com/datasets/sowmyamyneni/dapt2020/data

Note :-
—-

1) If the above plan does not satisfy your requirement, please provide the processing details, like the above step-by-step.

2) Please note that this implementation plan does not include any further steps after it is put into implementation.

3) If the plan satisfies your requirement, Please confirm with us.

4) Project based on Simulation only, not a real time project.

5) Please understand that any modifications made to the confirmed implementation plan will not be made before or after the project development.

We perform with an Existing Reference 1: Advanced Persistent Threat Identification with Boosting and Explainable AI

Live Tasks
Technology Ph.D MS M.Tech
NS2 75 117 95
NS3 98 119 206
OMNET++ 103 95 87
OPNET 36 64 89
QULANET 30 76 60
MININET 71 62 74
MATLAB 96 185 180
LTESIM 38 32 16
COOJA SIMULATOR 35 67 28
CONTIKI OS 42 36 29
GNS3 35 89 14
NETSIM 35 11 21
EVE-NG 4 8 9
TRANS 9 5 4
PEERSIM 8 8 12
GLOMOSIM 6 10 6
RTOOL 13 15 8
KATHARA SHADOW 9 8 9
VNX and VNUML 8 7 8
WISTAR 9 9 8
CNET 6 8 4
ESCAPE 8 7 9
NETMIRAGE 7 11 7
BOSON NETSIM 6 8 9
VIRL 9 9 8
CISCO PACKET TRACER 7 7 10
SWAN 9 19 5
JAVASIM 40 68 69
SSFNET 7 9 8
TOSSIM 5 7 4
PSIM 7 8 6
PETRI NET 4 6 4
ONESIM 5 10 5
OPTISYSTEM 32 64 24
DIVERT 4 9 8
TINY OS 19 27 17
TRANS 7 8 6
OPENPANA 8 9 9
SECURE CRT 7 8 7
EXTENDSIM 6 7 5
CONSELF 7 19 6
ARENA 5 12 9
VENSIM 8 10 7
MARIONNET 5 7 9
NETKIT 6 8 7
GEOIP 9 17 8
REAL 7 5 5
NEST 5 10 9
PTOLEMY 7 8 4

Related Pages

Workflow

YouTube Channel

Unlimited Network Simulation Results available here.

Related Topics