Enhancing Threat Detection in Enterprise Environments Through Behavioral Anomaly Analysis and Machine Learning Techniques
Keywords:
Cybersecurity, Machine Learning, Behavioral Anomaly Detection, Threat Intelligence, Enterprise Security, Supervised Learning, Intrusion Detection Systems, Data AnalyticsAbstract
Behavioral anomaly detection has emerged as a significant approach in cybersecurity, enabling systems to identify and respond to threats beyond traditional rule-based methods. This paper explores how machine learning techniques, especially those involving behavioral analytics, can enhance enterprise-level threat detection capabilities. Through a combination of supervised and unsupervised learning models, organizations can proactively identify deviations from normal activity that signal potential intrusions or malicious behavior. The study further evaluates the integration of these models into enterprise infrastructure, highlighting performance metrics and cost considerations
References
Chandola, V., Banerjee, A., & Kumar, V. (2009). Anomaly detection: A survey. ACM Computing Surveys, 41(3), 1–58. https://doi.org/10.1145/1541880.1541882
Kodi, D. (2024). Automating Software Engineering Workflows: Integrating Scripting and Coding in the Development Lifecycle . Journal of Computational Analysis and Applications (JoCAAA), 33(4), 635–652.
Sommer, R., & Paxson, V. (2010). Outside the closed world: On using machine learning for network intrusion detection. IEEE Symposium on Security and Privacy, 305–316. https://doi.org/10.1109/SP.2010.25
Kodi, D. (2024). Data Transformation and Integration: Leveraging Talend for Enterprise Solutions. International Journal of Innovative Research in Science, Engineering and Technology, 13(9), 16876–16886. https://doi.org/10.15680/IJIRSET.2024.1309124
Buczak, A. L., & Guven, E. (2016). A survey of data mining and machine learning methods for cyber security intrusion detection. IEEE Communications Surveys & Tutorials, 18(2), 1153–1176. https://doi.org/10.1109/COMST.2015.2494502
Creech, G., & Hu, J. (2014). A semantic approach to host-based intrusion detection systems using contiguous and discontiguous system call patterns. IEEE Transactions on Computers, 63(4), 807–819. https://doi.org/10.1109/TC.2013.13
Kodi, D. (2024). Performance and Cost Efficiency of Snowflake on AWS Cloud for Big Data Workloads. International Journal of Innovative Research in Computer and Communication Engineering, 12(6), 8407–8417. https://doi.org/10.15680/IJIRCCE.2023.1206002
Shone, N., Ngoc, T. N., Phai, V. D., & Shi, Q. (2018). A deep learning approach to network intrusion detection. IEEE Transactions on Emerging Topics in Computational Intelligence, 2(1), 41–50. https://doi.org/10.1109/TETCI.2017.2772792
Kodi, D. (2023). Optimizing Data Quality: Using SSIS for Data Cleansing and Transformation in ETL Pipelines. Library Progress International, 43(1), 192–208.
García-Teodoro, P., Díaz-Verdejo, J., Maciá-Fernández, G., & Vázquez, E. (2009). Anomaly-based network intrusion detection: Techniques, systems and challenges. Computers & Security, 28(1–2), 18–28. https://doi.org/10.1016/j.cose.2008.08.003
Kim, Y., Kim, Y., & Kim, H. (2017). A behavior-based anomaly detection system for insider threats. KSII Transactions on Internet and Information Systems, 11(4), 2077–2094.
Vinayakumar, R., Soman, K. P., & Poornachandran, P. (2017). Deep learning approach for intelligent intrusion detection system. IEEE/WIC/ACM International Conference on Web Intelligence.
Mukesh, V., Joel, D., Balaji, V. M., Tamilpriyan, R., & Yogesh Pandian, S. (2024). Data management and creation of routes for automated vehicles in smart city. International Journal of Computer Engineering and Technology (IJCET), 15(36), 2119–2150. doi: https://doi.org/10.5281/zenodo.14993009
Laskov, P., & Kotenko, I. (2011). Machine learning methods for network intrusion detection. Information and Computer Security.
Kodi, D. (2023). A Pythonic Approach to API Data Management: Fetching, Processing, and Displaying Data for Business Intelligence. International Journal of Emerging Research in Engineering and Technology, 4(2), 33–42. https://doi.org/10.63282/3050-922X/IJERET-V4I2P104
Dhanabal, L., & Shantharajah, S. P. (2015). A study on NSL-KDD dataset for intrusion detection system based on classification algorithms. International Journal of Advanced Research in Computer and Communication Engineering, 4(6).
Downloads
Published
Issue
Section
License
Copyright (c) 2024 Tomoka Shibasaki Yoko (Author)

This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.