All Title Author
Keywords Abstract

Publish in OALib Journal
ISSN: 2333-9721
APC: Only $99


Implementation of Machine Learning Method for the Detection and Prevention of Attack in Supervised Network

DOI: 10.4236/oalib.1108000, PP. 1-25

Subject Areas: Information and communication theory and algorithms, Information and Communication: Security, Privacy, and Trust, Computer and Network Security

Keywords: Big Data, Log Files, Machine Learning, Network Security, Supervised Network

Full-Text   Cite this paper   Add to My Lib


The sustainability of a company depends on the permanent availability of its information system. This reality influences the behavior of companies, which are becoming increasingly mature in their investments in information system security, which is an absolutely vital element. The use of a service called “SYSLOG” to centralize the network event logs that are sent by printers, servers, routers, firewalls, IDS and IPS in an SYSLOG server is a perfect example for network optimization. In this work, which consists in setting up a Machine learning algorithm for detection and prevention of attacks, we are interested on one hand with the problems encountered on the SYSLOG service and on the other hand with the problems encountered during the detection and prevention of anomalies in the SYSLOG service. In order to ensure an optimal level of security within the network according to the criteria specified, we will first proceed to an analysis of the log files present in the server; followed by an attack detection based on an automatic machine learning algorithm using the signature and historical behavior of the different attacks. As result, we have the possibility to generate real-time alerts on malfunctions; real-time monitoring of the use of an application (number of users, functions used, etc.); the identification of the origin of incidents occurring in applications.

Cite this paper

Kenfack, P. D. B. , Mbakop, F. K. and Eyong-Ebai, E. (2021). Implementation of Machine Learning Method for the Detection and Prevention of Attack in Supervised Network. Open Access Library Journal, 8, e8000. doi:


[1]  Bourget, E. (2016) New Perspectives for the Use of Logs in a Context of Computer Security. University of Montreal, Montreal.
[2]  Sendrier, N. (2007) Introduction à la théorie de l’information. Centre Inria de Paris, Ecole Polytechnique.
[3]  Dorard, L. (2020) Architecture of a Real-Word Machine Learning System.
[4]  Kone, A. (2013) Research and Development and Technology Watch on Big Data Trends and Technological Concepts. INSA of Lyon, Lyon.
[5]  Melnick, J. (2018) Top 10 Most Common Types of Cyber Attacks.
[6]  Kang, M.S., Lee, S.B. and Gligor, V.D. (2013) The Crossfire Attacks. Proceedings of the 2013 IEEE Symposium on Security and Privacy, San Francisco, May 2013, 127-141.
[7]  Benzaki, Y. (2017) Nine Machine Learning Algorithms Every Data Scientist Should Know.
[8]  Moutarde, F. (2011) Machine Learning. CAOR, MINES ParisTech.


comments powered by Disqus

Contact Us