Performance Analysis of Persistent Threat Detection Using Behavioral Analytics and Anomaly Detection
implementation plan:
====================
Step 1: Initially, We collect and load the data from ” DAPT2020 dataset ”
Step 2: Then, we preprocess the data using K Means-SMOTE (K-means clustering with Synthetic minority Oversampling Technique) method for Imbalance handling with Label encoding Modeling.
Step 3: Next, we perform a feature engineering process and then train the data using the ARM-ETC algorithm with Association Rule Mining and Extra Tree Classifier.
Step 4: Next, we analyze complex dynamic behaviors of APT malware using GP (Genetic Programming) algorithm.
Step 5: Next, we implement the IKC-HMM algorithm for detecting the anomalies in APT.
Step 6: Finally, we plot graph for the following metrics:
6.1: No. of Epochs vs. Accuracy (%)
6.2: No. of Epochs vs. Precision (%)
6.3: No. of Epochs vs. Recall (%)
6.4: No. of Epochs vs. F1-Score (%)
6.5: Confusion Matrix
Software Requirements:
———————-
1. Development Tool: Python 3.11.4
2. Operating System: Windows-11(64-bit)
Dataset:
——-
Dataset link: https: www.kaggle.com/datasets/sowmyamyneni/dapt2020/data
Note :-
—-
1) If the above plan does not satisfy your requirement, please provide the processing details, like the above step-by-step.
2) Please note that this implementation plan does not include any further steps after it is put into implementation.
3) If the plan satisfies your requirement, Please confirm with us.
4) Project based on Simulation only, not a real time project.
5) Please understand that any modifications made to the confirmed implementation plan will not be made before or after the project development.
We perform with an Existing Reference 1: Advanced Persistent Threat Identification with Boosting and Explainable AI
| Technology | Ph.D | MS | M.Tech |
|---|---|---|---|
| NS2 | 75 | 117 | 95 |
| NS3 | 98 | 119 | 206 |
| OMNET++ | 103 | 95 | 87 |
| OPNET | 36 | 64 | 89 |
| QULANET | 30 | 76 | 60 |
| MININET | 71 | 62 | 74 |
| MATLAB | 96 | 185 | 180 |
| LTESIM | 38 | 32 | 16 |
| COOJA SIMULATOR | 35 | 67 | 28 |
| CONTIKI OS | 42 | 36 | 29 |
| GNS3 | 35 | 89 | 14 |
| NETSIM | 35 | 11 | 21 |
| EVE-NG | 4 | 8 | 9 |
| TRANS | 9 | 5 | 4 |
| PEERSIM | 8 | 8 | 12 |
| GLOMOSIM | 6 | 10 | 6 |
| RTOOL | 13 | 15 | 8 |
| KATHARA SHADOW | 9 | 8 | 9 |
| VNX and VNUML | 8 | 7 | 8 |
| WISTAR | 9 | 9 | 8 |
| CNET | 6 | 8 | 4 |
| ESCAPE | 8 | 7 | 9 |
| NETMIRAGE | 7 | 11 | 7 |
| BOSON NETSIM | 6 | 8 | 9 |
| VIRL | 9 | 9 | 8 |
| CISCO PACKET TRACER | 7 | 7 | 10 |
| SWAN | 9 | 19 | 5 |
| JAVASIM | 40 | 68 | 69 |
| SSFNET | 7 | 9 | 8 |
| TOSSIM | 5 | 7 | 4 |
| PSIM | 7 | 8 | 6 |
| PETRI NET | 4 | 6 | 4 |
| ONESIM | 5 | 10 | 5 |
| OPTISYSTEM | 32 | 64 | 24 |
| DIVERT | 4 | 9 | 8 |
| TINY OS | 19 | 27 | 17 |
| TRANS | 7 | 8 | 6 |
| OPENPANA | 8 | 9 | 9 |
| SECURE CRT | 7 | 8 | 7 |
| EXTENDSIM | 6 | 7 | 5 |
| CONSELF | 7 | 19 | 6 |
| ARENA | 5 | 12 | 9 |
| VENSIM | 8 | 10 | 7 |
| MARIONNET | 5 | 7 | 9 |
| NETKIT | 6 | 8 | 7 |
| GEOIP | 9 | 17 | 8 |
| REAL | 7 | 5 | 5 |
| NEST | 5 | 10 | 9 |
| PTOLEMY | 7 | 8 | 4 |