A Study on Detection of Malicious Behavior Based on Host Process Data Using Machine Learningopen access
- Authors
- Han, Ryeobin; Kim, Kookjin; Choi, Byunghun; Jeong, Youngsik
- Issue Date
- Apr-2023
- Publisher
- MDPI
- Keywords
- behavior detection; anomaly detection; cyber security; machine learning
- Citation
- Applied Sciences, v.13, no.7, pp 1 - 17
- Pages
- 17
- Indexed
- SCIE
SCOPUS
- Journal Title
- Applied Sciences
- Volume
- 13
- Number
- 7
- Start Page
- 1
- End Page
- 17
- URI
- https://scholarworks.dongguk.edu/handle/sw.dongguk/18686
- DOI
- 10.3390/app13074097
- ISSN
- 2076-3417
2076-3417
- Abstract
- With the rapid increase in the number of cyber-attacks, detecting and preventing malicious behavior has become more important than ever before. In this study, we propose a method for detecting and classifying malicious behavior in host process data using machine learning algorithms. One of the challenges in this study is dealing with high-dimensional and imbalanced data. To address this, we first preprocessed the data using Principal Component Analysis (PCA) and Uniform Manifold Approximation and Projection (UMAP) to reduce the dimensions of the data and visualize the distribution. We then used the Adaptive Synthetic (ADASYN) and Synthetic Minority Over-sampling Technique (SMOTE) to handle the imbalanced data. We trained and evaluated the performance of the models using various machine learning algorithms, such as K-Nearest Neighbor, Naive Bayes, Random Forest, Autoencoder, and Memory-Augmented Deep Autoencoder (MemAE). Our results show that the preprocessed datasets using both ADASYN and SMOTE significantly improved the performance of all models, achieving higher precision, recall, and F1-Score values. Notably, the best performance was obtained when using the preprocessed dataset (SMOTE) with the MemAE model, yielding an F1-Score of 1.00. The evaluation was also conducted by measuring the Area Under the Receiver Operating Characteristic Curve (AUROC), which showed that all models performed well with an AUROC of over 90%. Our proposed method provides a promising approach for detecting and classifying malicious behavior in host process data using machine learning algorithms, which can be used in various fields such as anomaly detection and medical diagnosis.
- Files in This Item
- There are no files associated with this item.
- Appears in
Collections - College of Advanced Convergence Engineering > Department of Computer Science and Artificial Intelligence > 1. Journal Articles

Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.