Araştırma Makalesi

Measuring the Security Effectiveness of Machine Learning Methods Used Against Cyber Attacks in Web Applications

Cilt: 9 Sayı: 4 29 Aralık 2021
PDF İndir
EN TR

Measuring the Security Effectiveness of Machine Learning Methods Used Against Cyber Attacks in Web Applications

Abstract

The rapid progress of technological developments in the global world, the people to closely follow these developments and share them have become the focus of cybercriminals. People realize their basic needs, requests, shares or works via smart devices using the internet infrastructure. While performing these actions, users can inevitably leave an open door through web applications. As a result, user-defined information can easily be passed on to others. Recently, there has been a serious increase in activities carried out on websites. One of the reasons for this increase, and the most important one, is the pandemic that has had an impact worldwide. Cybercriminals want to turn such situations into opportunities and gain financial gain. They look for vulnerabilities in the websites that people demand heavily and they want to access their user information and card information. This study proposes an approach that measures the performance of machine learning methods against the vulnerabilities of various websites. The data set used in the study consists of parameter properties of 1000 websites. In the experimental analysis of the study; Multilayer Perceptron, Support Vector Machines, Decision Trees, Naive Bayesian, Random Forest methods were used. The general accuracy achievements obtained from machine learning methods are; it was 74%, 73.7%, 100%, 69.5% and 100%, respectively. Experimental analysis has shown that machine learning methods are effective in detecting cyber attacks.

Keywords

Kaynakça

  1. [1] Yin Z., Liu W., Chawla S., Adversarial Attack, Defense, and Applications with Deep Learning Frameworks, (2019) 1–25. doi:10.1007/978-3-030-13057-2_1.
  2. [2] Jang-Jaccard J., Nepal S., A survey of emerging threats in cybersecurity, J Comput Syst Sci, (2014) 80:973–93. doi:https://doi.org/10.1016/j.jcss.2014.02.005.
  3. [3] Nguyen M.H., Gruber J., Fuchs J., Marler W., Hunsaker A., Hargittai E., Changes in Digital Communication During the COVID-19 Global Pandemic: Implications for Digital Inequality and Future Research, Soc Media + Soc, (2020) 6:2056305120948255. doi:10.1177/2056305120948255.
  4. [4] Dunton G.F., Do B., Wang S.D., Early effects of the COVID-19 pandemic on physical activity and sedentary behavior in children living in the U.S., BMC Public Health, (2020) 20:1351. doi:10.1186/s12889-020-09429-3.
  5. [5] Buchanan R., What We Know about Identity Theft and Fraud Victims from Research-and Practice-Based Evidence center for victim Research Report, (2019) 34.
  6. [6] Hashizume K., Rosado D.G., Fernández-Medina E., Fernandez E.B., An analysis of security issues for cloud computing, J Internet Serv Appl, (2013) 4:5. doi:10.1186/1869-0238-4-5.
  7. [7] Marashdih A.W., Zaaba Z.F., Suwais K., Mohd N.A., Web application security: An investigation on static analysis with other algorithms to detect cross site scripting, Procedia Comput Sci, (2019) 161:1173–81. doi:10.1016/j.procs.2019.11.230.
  8. [8] Ferrara E., The history of digital spam, Commun ACM, (2019) 62:82–91. doi:10.1145/3299768.

Ayrıntılar

Birincil Dil

İngilizce

Konular

Mühendislik

Bölüm

Araştırma Makalesi

Yayımlanma Tarihi

29 Aralık 2021

Gönderilme Tarihi

10 Haziran 2021

Kabul Tarihi

8 Kasım 2021

Yayımlandığı Sayı

Yıl 2021 Cilt: 9 Sayı: 4

Kaynak Göster

APA
Toğaçar, M. (2021). Measuring the Security Effectiveness of Machine Learning Methods Used Against Cyber Attacks in Web Applications. Gazi Üniversitesi Fen Bilimleri Dergisi Part C: Tasarım ve Teknoloji, 9(4), 608-620. https://doi.org/10.29109/gujsc.950639

Cited By

                                     16168      16167     16166     21432        logo.png   


    e-ISSN:2147-9526