Global Network Cyberattack Classification Using Naive Bayes Method Time Range 2020 – 2023

Authors

  • Acep Sandi Mutia INDONESIA
  • Irawan Irawan INDONESIA
  • Christina Juliane INDONESIA

DOI:

https://doi.org/10.32832/astonjadro.v13i2.15683

Keywords:

data mining; classification of cyberattacks; naive bayes; network security; security data analysis.

Abstract

This study focuses on developing a classification model for cyberattacks on global networks during the time span of 2020 to 2023 using the Naive Bayes method. The main objective of the study is to analyze and classify the frequent severity of cyber, which helps in improving network security and reducing vulnerabilities. The Naive Bayes method was chosen for its efficiency in handling large datasets and its ability to make predictions based on probabilities. Collecting cyberattack data from a variety of reliable and up-to-date sources, the study covers attacks such as ransomware, phishing, DDoS, and other malware. The classification process includes data pre-processing, feature extraction, and finally the application of Naive Bayes algorithms to identify patterns in such attacks. The classification results are then evaluated using the Apply Model and Performance validation methods to assess the effectiveness of the model. The results of this study show that Naive Bayes is able to accurately classify cyberattacks, providing a useful tool for cybersecurity professionals to understand attack trends and respond proactively. The study also suggests areas for further research, including the integration of the Naive Bayes model with other artificial intelligence systems for improved cyberattack detection. The study provides new insights into the application of the Naive Bayes method in cybersecurity and paves the way for improved data-driven cyber defense strategies.

Author Biographies

Acep Sandi Mutia, INDONESIA

STMIK Likmi, Bandung

Irawan Irawan, INDONESIA

STMIK Likmi, Bandung

Christina Juliane, INDONESIA

STMIK Likmi, Bandung

References

Abu Al-Haija, Q., & Al-Fayoumi, M. (2023). An intelligent identification and classification system for malicious uniform resource locators (URLs). Neural Computing and Applications, 1–17.

Amin, B. M. R., Taghizadeh, S., Maric, S., Hossain, M. J., & Abbas, R. (2020). Smart grid security enhancement by using belief propagation. IEEE Systems Journal, 15(2), 2046–2057.

Bécue, A., Praça, I., & Gama, J. (2021). Artificial intelligence, cyber-threats and Industry 4.0: Challenges and opportunities. Artificial Intelligence Review, 54(5), 3849–3886.

Blanquero, R., Carrizosa, E., Ramírez-Cobo, P., & Sillero-Denamiel, M. R. (2021). Constrained Naïve Bayes with application to unbalanced data classification. Central European Journal of Operations Research, 1–23.

Chen, H., Hu, S., Hua, R., & Zhao, X. (2021). Improved naive Bayes classification algorithm for traffic risk management. EURASIP Journal on Advances in Signal Processing, 2021(1), 1–12.

Chu, S.-C., Dao, T.-K., Pan, J.-S., & Nguyen, T.-T. (2020). Identifying correctness data scheme for aggregating data in cluster heads of wireless sensor network based on naive Bayes classification. EURASIP Journal on Wireless Communications and Networking, 2020, 1–15.

Damayunita, A., Fuadi, R. S., & Juliane, C. (2022). Comparative Analysis of Naive Bayes, K-Nearest Neighbors (KNN), and Support Vector Machine (SVM) Algorithms for Classification of Heart Disease Patients. Jurnal Online Informatika, 7(2), 219–225.

Fahd, K., Miao, Y., Miah, S. J., Venkatraman, S., & Ahmed, K. (2022). Knowledge graph model development for knowledge discovery in dementia research using cognitive scripting and next-generation graph-based database: a design science research approach. Social Network Analysis and Mining, 12(1), 61.

Hosseinzadeh, M., Azhir, E., Ahmed, O. H., Ghafour, M. Y., Ahmed, S. H., Rahmani, A. M., & Vo, B. (2021). Data cleansing mechanisms and approaches for big data analytics: a systematic study. Journal of Ambient Intelligence and Humanized Computing, 1–13.

Kim, T., & Lee, J.-S. (2022). Exponential loss minimization for learning weighted naive bayes classifiers. IEEE Access, 10, 22724–22736.

Kuhn, K., Bicakci, S., & Shaikh, S. A. (2021). COVID-19 digitization in maritime: understanding cyber risks. WMU Journal of Maritime Affairs, 20(2), 193–214.

Lin, C.-J., Huang, M.-S., & Lee, C.-L. (2022). Malware Classification Using Convolutional Fuzzy Neural Networks Based on Feature Fusion and the Taguchi Method. Applied Sciences, 12(24), 12937.

Redivo, E., Viroli, C., & Farcomeni, A. (2023). Quantile-distribution functions and their use for classification, with application to naïve Bayes classifiers. Statistics and Computing, 33(2), 55.

Sarker, I. H. (2023). Machine learning for intelligent data analysis and automation in cybersecurity: current and future prospects. Annals of Data Science, 10(6), 1473–1498.

Sarker, I. H., Kayes, A. S. M., Badsha, S., Alqahtani, H., Watters, P., & Ng, A. (2020). Cybersecurity data science: an overview from machine learning perspective. Journal of Big Data, 7, 1–29.

Schoenenwald, A., Kern, S., Viehhauser, J., & Schildgen, J. (2021). Collecting and visualizing data lineage of Spark jobs: Digesting Spark execution plans to surface lineage graphs via a full-stack application. Datenbank-Spektrum, 21, 179–189.

Shi, Y., Lu, X., Niu, Y., & Li, Y. (2021). Efficient jamming identification in wireless communication: Using small sample data driven naive bayes classifier. IEEE Wireless Communications Letters, 10(7), 1375–1379.

Shukla, P., Krishna, C. R., & Patil, N. V. (2023). EIoT-DDoS: embedded classification approach for IoT traffic-based DDoS attacks. Cluster Computing, 1–20.

Syrmakesis, A. D., Alcaraz, C., & Hatziargyriou, N. D. (2022). Classifying resilience approaches for protecting smart grids against cyber threats. International Journal of Information Security, 21(5), 1189–1210.

Veeramanickam, M. R., Khullar, V., Salunke, M. D., Bangare, J. L., Bhosle, A. A., & Ingavale, A. (2022). Streamed Incremental Learning for Cyber Attack Classification using Machine Learning. 2022 2nd International Conference on Innovative Sustainable Computational Technologies (CISCT), 1–5.

Sari, O. L., Basyaruddin, B., & Khasanah, U. (2024). Building Maintenance Priority Decision Support System Using the Method Profile Matching. ASTONJADRO, 13(1), 125–137. https://doi.org/10.32832/astonjadro.v13i1.14495

Nur Aulia, A., Tsani, M., & Suharso, W. (2024). Design a Web-Based Library Information System Using the Waterfall Method (Case Study of SMA Muhammadiyah 2). ASTONJADRO, 13(1), 169–181. https://doi.org/10.32832/astonjadro.v13i1.14562

Pradnyana, I. M., Widyantara, I. M. O., & Pramaita, N. (2023). Evaluation of DVB-T2 Digital TV Propagation Performance in the Bali Broadcast Area. ASTONJADRO, 12(3), 886–896. https://doi.org/10.32832/astonjadro.v12i3.14311

Prastowo, F. I., Husin, A. E., & Amalia, N. (2023). Improving Project Performance Based on Building Information Modelling 6D & LCCA in High-Rise Office Building. ASTONJADRO, 12(2), 368–378. https://doi.org/10.32832/astonjadro.v12i2.8787

Published

2024-05-22

How to Cite

Sandi Mutia, A., Irawan, I., & Juliane, C. (2024). Global Network Cyberattack Classification Using Naive Bayes Method Time Range 2020 – 2023. ASTONJADRO, 13(2), 587–596. https://doi.org/10.32832/astonjadro.v13i2.15683

Issue

Section

Articles