<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Publishing DTD v1.4 20241031//EN"
        "https://jats.nlm.nih.gov/publishing/1.4/JATS-journalpublishing1-4.dtd">
<article  article-type="research-article"        dtd-version="1.4">
            <front>

                <journal-meta>
                                                                <journal-id>saucis</journal-id>
            <journal-title-group>
                                                                                    <journal-title>Sakarya University Journal of Computer and Information Sciences</journal-title>
            </journal-title-group>
                                        <issn pub-type="epub">2636-8129</issn>
                                                                                            <publisher>
                    <publisher-name>Sakarya University</publisher-name>
                </publisher>
                    </journal-meta>
                <article-meta>
                                        <article-id pub-id-type="doi">10.35377/saucis...1698023</article-id>
                                                                <article-categories>
                                            <subj-group  xml:lang="en">
                                                            <subject>Software Engineering (Other)</subject>
                                                    </subj-group>
                                            <subj-group  xml:lang="tr">
                                                            <subject>Yazılım Mühendisliği (Diğer)</subject>
                                                    </subj-group>
                                    </article-categories>
                                                                                                                                                        <title-group>
                                                                                                                        <article-title>Network Traffic Factors Detection and Prediction Using Artificial Neural Networks</article-title>
                                                                                                                                        </title-group>
            
                                                    <contrib-group content-type="authors">
                                                                        <contrib contrib-type="author">
                                                                    <contrib-id contrib-id-type="orcid">
                                        https://orcid.org/0000-0001-8431-5189</contrib-id>
                                                                <name>
                                    <surname>Özdemir</surname>
                                    <given-names>Muhammed</given-names>
                                </name>
                                                                    <aff>Turkish Maritime Enterprises Inc.</aff>
                                                            </contrib>
                                                    <contrib contrib-type="author">
                                                                    <contrib-id contrib-id-type="orcid">
                                        https://orcid.org/0000-0003-4926-3779</contrib-id>
                                                                <name>
                                    <surname>Akpınar</surname>
                                    <given-names>Mustafa</given-names>
                                </name>
                                                                    <aff>Higher Collages of Technology</aff>
                                                            </contrib>
                                                    <contrib contrib-type="author">
                                                                    <contrib-id contrib-id-type="orcid">
                                        https://orcid.org/0000-0002-6006-3228</contrib-id>
                                                                <name>
                                    <surname>Eski</surname>
                                    <given-names>Hüseyin</given-names>
                                </name>
                                                                    <aff>SAKARYA UNIVERSITY, FACULTY OF TECHNOLOGY, DEPARTMENT OF COMPUTER ENGINEERING, COMPUTER ENGINEERING PR.</aff>
                                                            </contrib>
                                                                                </contrib-group>
                        
                                        <pub-date pub-type="pub" iso-8601-date="20251229">
                    <day>12</day>
                    <month>29</month>
                    <year>2025</year>
                </pub-date>
                                        <volume>8</volume>
                                        <issue>4</issue>
                                        <fpage>688</fpage>
                                        <lpage>700</lpage>
                        
                        <history>
                                    <date date-type="received" iso-8601-date="20250512">
                        <day>05</day>
                        <month>12</month>
                        <year>2025</year>
                    </date>
                                                    <date date-type="accepted" iso-8601-date="20250901">
                        <day>09</day>
                        <month>01</month>
                        <year>2025</year>
                    </date>
                            </history>
                                        <permissions>
                    <copyright-statement>Copyright © 2018, Sakarya University Journal of Computer and Information Sciences</copyright-statement>
                    <copyright-year>2018</copyright-year>
                    <copyright-holder>Sakarya University Journal of Computer and Information Sciences</copyright-holder>
                </permissions>
            
                                                                                                <abstract><p>Rising technology generates an increasing data flow on the internet by the day. Specific security systems are crucial for managing this growing data traffic. One such security system is the firewall used in Turkey Maritime Enterprises Inc. (TME). All TME internet traffic is controlled by a security firewall that operates within existing rules and regulations. The security firewall produces output based on traffic categorized as “allowed” or “blocked.” This study collected log records from the firewall on five different days to create datasets. Twenty-six variables were extracted from the firewall logs, excluding the output. The study aimed to identify the most significant parameters impacting the output using linear regression (LR) and principal component analysis (PCA). The analysis identified mutually influential log variables affecting the output using two methods. After, the initial dataset with 26 variables and a reduced dataset with six variables were used to predict output using the artificial neural network (ANN) for five datasets. The prediction accuracy and precision ranges were between 85% and 88% and 92% and 98%, respectively. The F1-score showed results between 89% and 92% in addition to accuracy and precision. ML and PCA methods successfully identified crucial variables for estimating output and reduced the number of variables from 26 to 5. Moreover, it was noted that the ANN could accurately determine whether firewall traffic would be blocked or allowed based on the reduced datasets. Reducing the feature space from 26 to 6 variables identified via MLR+PCA improved ANN performance across hours, indicating that compact, interpretable inputs can support accurate firewall-traffic prediction.</p></abstract>
                                                                                    
            
                                                            <kwd-group>
                                                    <kwd>Cyber security</kwd>
                                                    <kwd>  Firewall</kwd>
                                                    <kwd>  Log</kwd>
                                                    <kwd>  Linear regression</kwd>
                                                    <kwd>  Principal component analysis</kwd>
                                                    <kwd>  Artificial neural networks</kwd>
                                            </kwd-group>
                                                        
                                                                                                                                                    </article-meta>
    </front>
    <back>
                            <ref-list>
                                    <ref id="ref1">
                        <label>1</label>
                        <mixed-citation publication-type="journal">H. N. K. Al-Bedahili, “Decision Tree for Multiclass of Firewall Access,” in International Journal of Intelligent Engineering and Systems, vol. 14, no 3, pp. 294-302, 2021.</mixed-citation>
                    </ref>
                                    <ref id="ref2">
                        <label>2</label>
                        <mixed-citation publication-type="journal">İnternet Ortamında Yapılan Yayınların Düzenlenmes ve Bu Yayınlar Yoluyla İşlenen Suçlarla Mücadele Edilmesi Hakkında Kanun, 23 Mayıs 2007 26530 Sayılı Karar, Resmi Gazete, 2007</mixed-citation>
                    </ref>
                                    <ref id="ref3">
                        <label>3</label>
                        <mixed-citation publication-type="journal">E. Özhan, “Güvenlik Duvarı Günlüklerinin Makine Öğrenmesi Yöntemleri ile Analizi ve Bir Model Çıkartılması,” PhD Dissertation, Trakya University, Turkey, 2013.</mixed-citation>
                    </ref>
                                    <ref id="ref4">
                        <label>4</label>
                        <mixed-citation publication-type="journal">E. Akbaş, “Bilgi Güvenliği ve Log Yönetimi Sistemlerinin Analizi,”, Web Sayfası: http://www. academia. edu/9203287/Bilgi_G% C3% BCvenli% C4% 9Fi _ve_Log_Y% C3% B6netimi_Sistemlerinin_Analizi, 2017</mixed-citation>
                    </ref>
                                    <ref id="ref5">
                        <label>5</label>
                        <mixed-citation publication-type="journal">A. E. Mohammed, “Güvenlik Duvarı Kurallarına Ait Anomalilerin Tespiti ve Optimizasyonu,” M.S. Dissertation, Sakarya University, Turkey, 2018.</mixed-citation>
                    </ref>
                                    <ref id="ref6">
                        <label>6</label>
                        <mixed-citation publication-type="journal">Aljabri, M., Alahmadi, A. A., Mohammad, R. M. A., Aboulnour, M., Alomari, D. M., &amp; Almotiri, S. H., “Classification of firewall log data using multiclass machine learning models,” in Electronics vol. 11, No.12, 1851, 2022.</mixed-citation>
                    </ref>
                                    <ref id="ref7">
                        <label>7</label>
                        <mixed-citation publication-type="journal">Q. A. Al-Haija, A. Ishtaiwi, “Machine Learning Based Model to Identify Firewall Decisions to Improve Cyber-Defense,” International Journal on Advanced Science, Engineering and Information Technology, vol. 11, No. 4, pp. 1688-1695, 2021.</mixed-citation>
                    </ref>
                                    <ref id="ref8">
                        <label>8</label>
                        <mixed-citation publication-type="journal">F. Ertam, M. Kaya, “Classification of Firewall Log Files With Multiclass Support Vector Machine,” in International Symposium on Digital Forensic and Security (ISDFS), Antalya, Turkey, 2018, pp. 1-4.</mixed-citation>
                    </ref>
                                    <ref id="ref9">
                        <label>9</label>
                        <mixed-citation publication-type="journal">B. A. Al-Tarawneh, H. Bani-Salameh, “Classification of Firewall Logs Actions Using Machine Learning Techniques and Deep Neural Network,” in AIP Conference Proceedings, Jordan, Amman, 2023, vol. 2979, No. 1.</mixed-citation>
                    </ref>
                                    <ref id="ref10">
                        <label>10</label>
                        <mixed-citation publication-type="journal">K. İlhan, “Web Trafik Verilerinde Yapau Bağışıklık algoritmaları ile Anomali Tespiti,” M.S. Dissertation, Bilecik Seyh Edebali University, Turkey, 2019.</mixed-citation>
                    </ref>
                                    <ref id="ref11">
                        <label>11</label>
                        <mixed-citation publication-type="journal">K. Ovaz Akpinar, I. Ozcelik, “Anomaly detection on EtherCAT based water level control automation,” in 2020 5th International Conference on Computer Science and Engineering (UBMK), Diyarbakir, Turkey, 2020, pp. 79-82.</mixed-citation>
                    </ref>
                                    <ref id="ref12">
                        <label>12</label>
                        <mixed-citation publication-type="journal">K. Ovaz Akpinar, I. Ozcelik, “Methodology to determine the device-level periodicity for anomaly detection in EtherCAT-based industrial control network,” IEEE Transactions on Network and Service Management, 18, 2, 2308-2319, 10.2020.</mixed-citation>
                    </ref>
                                    <ref id="ref13">
                        <label>13</label>
                        <mixed-citation publication-type="journal">M. Şahin, “Uygulama Katmanı için Güvenlik Duvarı Geliştirilmesi,” M.S. Dissertation, Gebze Teknik University, Turkey, 2017.</mixed-citation>
                    </ref>
                                    <ref id="ref14">
                        <label>14</label>
                        <mixed-citation publication-type="journal">C. Lillmond, G. Suddul, “A Deep Neural Network Approach for Analysis of Firewall Log Data,” in International Conference on Advances in Computing and Technology (ICACT–2021) Faculty of Computing and Technology (FCT), University of Kelaniya, Sri Lanka, 2021, pp. 42-46.</mixed-citation>
                    </ref>
                                    <ref id="ref15">
                        <label>15</label>
                        <mixed-citation publication-type="journal">S. Applebaum, T. Gaber, A. Ahmed, “Signature-based and Machine Learning-based Web Application Firewalls: A Short Survey” in Procedia Computer Science, vol. 189, pp. 359-367, 2021.</mixed-citation>
                    </ref>
                                    <ref id="ref16">
                        <label>16</label>
                        <mixed-citation publication-type="journal">E. Uçar, E. Özhan, “The Analysis of Firewall Policy Through Machine Learning and Data Mining” in Wireless Personel Communications, vol. 96, pp. 2891-2909, 2017.</mixed-citation>
                    </ref>
                                    <ref id="ref17">
                        <label>17</label>
                        <mixed-citation publication-type="journal">S. P. Kulyadi, p. Mohandas, S. K. S. Kumar, M. J. S. Raman, V. S. Vasan, “Anomaly Detection Using Generative Adversarial Networks on Firewall Log Message Data,” in 2021 13th International Conference on Electronics, Computers and Artificial Intelligence (ECAI), Pitesti, Romania, 2021, pp. 1-6.</mixed-citation>
                    </ref>
                                    <ref id="ref18">
                        <label>18</label>
                        <mixed-citation publication-type="journal">A. Shaheed, M. H. D. Bassam Kurdy, “Werb Application Firewall Using Machine Learning and Feature Engineering,” in Security and Communication Networks, vol. 2022, 2021.</mixed-citation>
                    </ref>
                                    <ref id="ref19">
                        <label>19</label>
                        <mixed-citation publication-type="journal">E. Tosunoğlu, R. Yılmaz, E. Özeren, Z. Sağlam, “Eğitimde Makine Öğrenmesi: Araştırmalardaki Güncel Eğilimler Üzerine İnceleme”, in Ahmet Keleşoğlu Eğitim Fakültesi Dergisi, vol. 2. No., 2., 2021.</mixed-citation>
                    </ref>
                                    <ref id="ref20">
                        <label>20</label>
                        <mixed-citation publication-type="journal">M. W. Berry, A. Mohamed, B. W. Yap, “Supervised and Unsupervised Learning for Data Science,” in Springer Nature, Cham, Switzerland, 2020.</mixed-citation>
                    </ref>
                                    <ref id="ref21">
                        <label>21</label>
                        <mixed-citation publication-type="journal">A. Şenol, Y. Canbay, M. Kaya, “Trends in Outbreak Detection in Early Stage by Using Machine Learning Approaches,” in Bilişim Teknolojileri Dergisi, vol. 14. No. 4, pp. 355-366, 2021.</mixed-citation>
                    </ref>
                                    <ref id="ref22">
                        <label>22</label>
                        <mixed-citation publication-type="journal">D. H. Maulud, A. M. Abdulazeez, “A Review on Linear Regression Comprehensive in Machine Learning”, in Journal of Applied Science and Technology Trends. vol. 1, No. 4, pp. 140-147, 2020.</mixed-citation>
                    </ref>
                                    <ref id="ref23">
                        <label>23</label>
                        <mixed-citation publication-type="journal">K.P. Burnham, Multimodel Inference: Understanding AIC and BIC in Model Selection. Sociological Methods &amp; Research, 33, 2, 261–304, 2004.</mixed-citation>
                    </ref>
                                    <ref id="ref24">
                        <label>24</label>
                        <mixed-citation publication-type="journal">S. Makridakis, S.C. Wheelwright, R.J. Hyndman, Forecasting: Methods and Applications, NY, USA, John Wiley: New York, 2008.</mixed-citation>
                    </ref>
                                    <ref id="ref25">
                        <label>25</label>
                        <mixed-citation publication-type="journal">İ. M. Nasser, M. O. Al-Shawwa, S. S. Abu-Naser, “A Proposed Artifical Neural Network for Predicting Movies Rates Category” in Interrnational Journal of Academic Engineering Research (IJAER), vol. 3. No. 2, pp. 21-25, 2019.</mixed-citation>
                    </ref>
                                    <ref id="ref26">
                        <label>26</label>
                        <mixed-citation publication-type="journal">M. Kayakuş, M. Terzioğlu, “Yapay Sinir Ağları ve Çoklu Doğrusal Regresyon Kullanarak Emeklilik Fonu Net Varlık Değerlerinin Tahmin Edilmesi”, Bilişim Teknolojileri Dergisi, vol. 14, No. 1, pp. 95-103, 2021.</mixed-citation>
                    </ref>
                                    <ref id="ref27">
                        <label>27</label>
                        <mixed-citation publication-type="journal">I. T. Jolliffe, Principal component analysis: With 28 illustrations. New York, USA: Springer, 2002.</mixed-citation>
                    </ref>
                                    <ref id="ref28">
                        <label>28</label>
                        <mixed-citation publication-type="journal">T. Hastie, J. Friedman, R. Tisbshirani, The elements of Statistical Learning: Data Mining, Inference, and prediction. New York: Springer, 2017.</mixed-citation>
                    </ref>
                                    <ref id="ref29">
                        <label>29</label>
                        <mixed-citation publication-type="journal">A. Akhtar, S. Akhtar, B. Bakhtawar, A. A. Kashif, N. Aziz, M. S. Javeid, “Covid-19 Detection From CBC Using Machine Learning Techniques,” in International Journal of Technology, Innovation and Management (IJTIM), vol. 1, No. 2, pp. 65-78, 2021.</mixed-citation>
                    </ref>
                            </ref-list>
                    </back>
    </article>
