Enhancing Threat Detection in Enterprise Environments Through Behavioral Anomaly Analysis and Machine Learning Techniques

Authors

  • Tomoka Shibasaki Yoko Cybersecurity Data Scientist, Author

Keywords:

Cybersecurity, Machine Learning, Behavioral Anomaly Detection, Threat Intelligence, Enterprise Security, Supervised Learning, Intrusion Detection Systems, Data Analytics

Abstract

Behavioral anomaly detection has emerged as a significant approach in cybersecurity, enabling systems to identify and respond to threats beyond traditional rule-based methods. This paper explores how machine learning techniques, especially those involving behavioral analytics, can enhance enterprise-level threat detection capabilities. Through a combination of supervised and unsupervised learning models, organizations can proactively identify deviations from normal activity that signal potential intrusions or malicious behavior. The study further evaluates the integration of these models into enterprise infrastructure, highlighting performance metrics and cost considerations

References

Chandola, V., Banerjee, A., & Kumar, V. (2009). Anomaly detection: A survey. ACM Computing Surveys, 41(3), 1–58. https://doi.org/10.1145/1541880.1541882

Kodi, D. (2024). Automating Software Engineering Workflows: Integrating Scripting and Coding in the Development Lifecycle . Journal of Computational Analysis and Applications (JoCAAA), 33(4), 635–652.

Sommer, R., & Paxson, V. (2010). Outside the closed world: On using machine learning for network intrusion detection. IEEE Symposium on Security and Privacy, 305–316. https://doi.org/10.1109/SP.2010.25

Kodi, D. (2024). Data Transformation and Integration: Leveraging Talend for Enterprise Solutions. International Journal of Innovative Research in Science, Engineering and Technology, 13(9), 16876–16886. https://doi.org/10.15680/IJIRSET.2024.1309124

Buczak, A. L., & Guven, E. (2016). A survey of data mining and machine learning methods for cyber security intrusion detection. IEEE Communications Surveys & Tutorials, 18(2), 1153–1176. https://doi.org/10.1109/COMST.2015.2494502

Creech, G., & Hu, J. (2014). A semantic approach to host-based intrusion detection systems using contiguous and discontiguous system call patterns. IEEE Transactions on Computers, 63(4), 807–819. https://doi.org/10.1109/TC.2013.13

Kodi, D. (2024). Performance and Cost Efficiency of Snowflake on AWS Cloud for Big Data Workloads. International Journal of Innovative Research in Computer and Communication Engineering, 12(6), 8407–8417. https://doi.org/10.15680/IJIRCCE.2023.1206002

Shone, N., Ngoc, T. N., Phai, V. D., & Shi, Q. (2018). A deep learning approach to network intrusion detection. IEEE Transactions on Emerging Topics in Computational Intelligence, 2(1), 41–50. https://doi.org/10.1109/TETCI.2017.2772792

Kodi, D. (2023). Optimizing Data Quality: Using SSIS for Data Cleansing and Transformation in ETL Pipelines. Library Progress International, 43(1), 192–208.

García-Teodoro, P., Díaz-Verdejo, J., Maciá-Fernández, G., & Vázquez, E. (2009). Anomaly-based network intrusion detection: Techniques, systems and challenges. Computers & Security, 28(1–2), 18–28. https://doi.org/10.1016/j.cose.2008.08.003

Kim, Y., Kim, Y., & Kim, H. (2017). A behavior-based anomaly detection system for insider threats. KSII Transactions on Internet and Information Systems, 11(4), 2077–2094.

Vinayakumar, R., Soman, K. P., & Poornachandran, P. (2017). Deep learning approach for intelligent intrusion detection system. IEEE/WIC/ACM International Conference on Web Intelligence.

Mukesh, V., Joel, D., Balaji, V. M., Tamilpriyan, R., & Yogesh Pandian, S. (2024). Data management and creation of routes for automated vehicles in smart city. International Journal of Computer Engineering and Technology (IJCET), 15(36), 2119–2150. doi: https://doi.org/10.5281/zenodo.14993009

Laskov, P., & Kotenko, I. (2011). Machine learning methods for network intrusion detection. Information and Computer Security.

Kodi, D. (2023). A Pythonic Approach to API Data Management: Fetching, Processing, and Displaying Data for Business Intelligence. International Journal of Emerging Research in Engineering and Technology, 4(2), 33–42. https://doi.org/10.63282/3050-922X/IJERET-V4I2P104

Dhanabal, L., & Shantharajah, S. P. (2015). A study on NSL-KDD dataset for intrusion detection system based on classification algorithms. International Journal of Advanced Research in Computer and Communication Engineering, 4(6).

Downloads

Published

19-11-2024

How to Cite

Tomoka Shibasaki Yoko. (2024). Enhancing Threat Detection in Enterprise Environments Through Behavioral Anomaly Analysis and Machine Learning Techniques. International Journal of Computer Science and Information Technology Research , 5(2), 61-66. https://ijcsitr.com/index.php/home/article/view/IJCSITR_2024_05_02_006