The final, formatted version of the article will be published soon.
ORIGINAL RESEARCH article
Front. Artif. Intell.
Sec. Machine Learning and Artificial Intelligence
Volume 7 - 2024 |
doi: 10.3389/frai.2024.1394363
Protecting Digital Assets using an Ontology Based Cyber Situational Awareness System
Provisionally accepted- 1 University of Tabuk, Tabuk, Tabuk, Saudi Arabia
- 2 NEOM, Tabuk city, Saudi Arabia
- 3 University of Copenhagen, Copenhagen, Capital Region of Denmark, Denmark
- 4 RV University, Bengaluru, India
This paper introduces a comprehensive methodology designed to enhance Cyber Situational Awareness by integrating Isolation Forest and Autoencoder algorithms, Structured Threat Information Expression (STIX) implementation, and ontology development. This study emphasizes the crucial role of the Isolation Forest algorithm, which is renowned for its efficiency, scalability, and robustness in identifying anomalies in high-dimensional cybersecurity datasets. In combination, autoencoders offer nonlinear detection capabilities, feature learning, and adaptability. The proposed dual approach significantly improves proactive anomaly detection. Furthermore, the integration of STIX standardizes threat information expression, which enhances cyber threat intelligence. Feature mapping enriches datasets with contextual threat information, and ontology development facilitates structured knowledge representation in the cybersecurity domain, which facilitates dynamic assessment and semantic correlation of threat intelligence data. A comparative analysis of the unsupervised machine learning algorithms Isolation Forest, Local Outlier Factor (LOF), and Autoencoder was conducted on the UNSW-NB15 dataset. The proposed model outperformed the others in terms of all metrics, achieving 95% accuracy, 99% F1 score, and 94.60% recall rate, demonstrating its superior effectiveness relative to enhancing cybersecurity situational awareness.
Keywords: anomaly detection, cyber situational awareness, Structured Threat Information Expression, Isolation forest algorithm, Auto encoder
Received: 01 Mar 2024; Accepted: 20 Nov 2024.
Copyright: © 2024 Almoabady, Mohammad Alblawi, Emad Albalawi, Aborokbah, S, SAAD ALJUHANI, Aldawood, Alashoor and P. This is an open-access article distributed under the terms of the Creative Commons Attribution License (CC BY). The use, distribution or reproduction in other forums is permitted, provided the original author(s) or licensor are credited and that the original publication in this journal is cited, in accordance with accepted academic practice. No use, distribution or reproduction is permitted which does not comply with these terms.
* Correspondence:
Karthikeyan P, RV University, Bengaluru, India
Disclaimer: All claims expressed in this article are solely those of the authors and do not necessarily represent those of their affiliated organizations, or those of the publisher, the editors and the reviewers. Any product that may be evaluated in this article or claim that may be made by its manufacturer is not guaranteed or endorsed by the publisher.